Security Auditing Tools: A Comparative Study

Saria Islam
{"title":"Security Auditing Tools: A Comparative Study","authors":"Saria Islam","doi":"10.25147/ijcsr.2017.001.1.49","DOIUrl":null,"url":null,"abstract":"Purpose – This paper concentrates on the comparison of security auditing tools specifying password cracking tools based on different matrices. Passwords are the most popular and dominant means of access control in every authentication process. Every password is vulnerable in the virtual world; all we can do is to delay it for one to break into us. Password cracking used in two opposite intentions; either it can be used for an administrator to protect from unauthorized access and for users to recover forgotten passwords or for an intruder to break into a secure system.Method – A great number of attacks on many systems are related to passwords. Awkwardly, the randomness and length of user-chosen passwords remain the same over time, but in contrast, hardware enhancement continuously gives intruders increasing computational power. So, password cracking has been one of the favorite vulnerable aspects for intruders to gain access to any unauthorized system. Among all available freeware password cracking tools, we choose five renowned tools based on offline and online categories.Results – Cain and Abel is the winner in the offline category, and TCH-Hydra is the winner in the online category in their performance among the tools we have tested.Conclusion – In this paper, the data has been collected by testing each tool several times in different systems as well as all tools in the same system based on different matrices. We have come to a knowledgeable result by comparing data among themselves. The results of the comparison will help in the adoption and usage of these tools and also promote the development and usage of security auditing tools.Recommendations – The results of the comparison will help in the adoption and usage of these tools and also promote the development and usage of security auditing tools.","PeriodicalId":33870,"journal":{"name":"International Journal of Computing Sciences Research","volume":"47 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing Sciences Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25147/ijcsr.2017.001.1.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Purpose – This paper concentrates on the comparison of security auditing tools specifying password cracking tools based on different matrices. Passwords are the most popular and dominant means of access control in every authentication process. Every password is vulnerable in the virtual world; all we can do is to delay it for one to break into us. Password cracking used in two opposite intentions; either it can be used for an administrator to protect from unauthorized access and for users to recover forgotten passwords or for an intruder to break into a secure system.Method – A great number of attacks on many systems are related to passwords. Awkwardly, the randomness and length of user-chosen passwords remain the same over time, but in contrast, hardware enhancement continuously gives intruders increasing computational power. So, password cracking has been one of the favorite vulnerable aspects for intruders to gain access to any unauthorized system. Among all available freeware password cracking tools, we choose five renowned tools based on offline and online categories.Results – Cain and Abel is the winner in the offline category, and TCH-Hydra is the winner in the online category in their performance among the tools we have tested.Conclusion – In this paper, the data has been collected by testing each tool several times in different systems as well as all tools in the same system based on different matrices. We have come to a knowledgeable result by comparing data among themselves. The results of the comparison will help in the adoption and usage of these tools and also promote the development and usage of security auditing tools.Recommendations – The results of the comparison will help in the adoption and usage of these tools and also promote the development and usage of security auditing tools.
安全审计工具的比较研究
目的:本文着重于基于不同矩阵指定密码破解工具的安全审计工具的比较。在每个身份验证过程中,密码是最流行和最主要的访问控制手段。每个密码在虚拟世界中都是脆弱的;我们所能做的就是拖延,等着有人闯进来。用于两种相反意图的密码破解;它既可以用于管理员防止未经授权的访问,也可以用于用户恢复忘记的密码,或者用于入侵者闯入安全系统。方法:在很多系统中,大量的攻击都与密码有关。令人尴尬的是,随着时间的推移,用户选择的密码的随机性和长度保持不变,但与此相反,硬件的不断增强使入侵者的计算能力不断增强。因此,密码破解一直是入侵者访问任何未经授权的系统的最易受攻击的方面之一。在所有可用的免费密码破解工具中,我们根据离线和在线类别选择了五个知名工具。结果-在我们测试的工具中,Cain和Abel在离线类别中获胜,TCH-Hydra在在线类别中表现最佳。结论-在本文中,通过在不同系统中对每个工具进行多次测试,以及在同一系统中基于不同矩阵对所有工具进行测试来收集数据。我们通过比较他们之间的数据得出了一个知识渊博的结果。比较的结果将有助于这些工具的采用和使用,也将促进安全审计工具的开发和使用。建议——比较的结果将有助于采用和使用这些工具,并促进安全审计工具的开发和使用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
25
审稿时长
20 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信