Eric B. Blancaflor, Michael Rafael A. Dela Cruz, Jeptha Mathan V. Espanola, Luis Rafael V. Laurena, John Wendell J. Maranan, Marjun Gil D. Pinza
{"title":"使用在线密码恢复工具- Cain & Abel对笔记本电脑设备进行密码强度评估","authors":"Eric B. Blancaflor, Michael Rafael A. Dela Cruz, Jeptha Mathan V. Espanola, Luis Rafael V. Laurena, John Wendell J. Maranan, Marjun Gil D. Pinza","doi":"10.1145/3483816.3483820","DOIUrl":null,"url":null,"abstract":"Password cracking procedures are often done using password recovery tools, this has led to attackers using the same technique to obtain access to weak frameworks and infrastructures. The study conducted two trials of strength assessment for (1) weak password and (2) strong password using a Cain & Abel to show the potential risks of both passwords. Two procedures were used for the strength assessment: brute force and dictionary attacks. The findings of this study shows that passwords containing only uppercase and lowercase letters with numbers (3 to 8 characters) are easily exploited. The study concluded that using strong passwords prevent potential cybersecurity attacks because strong passwords require more resources, power, and time to hack.","PeriodicalId":388509,"journal":{"name":"Proceedings of the 8th International Conference on Management of e-Commerce and e-Government","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Password Strength Assessment on a Laptop Device using an Online Password Recovery Tool — Cain & Abel\",\"authors\":\"Eric B. Blancaflor, Michael Rafael A. Dela Cruz, Jeptha Mathan V. Espanola, Luis Rafael V. Laurena, John Wendell J. Maranan, Marjun Gil D. Pinza\",\"doi\":\"10.1145/3483816.3483820\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Password cracking procedures are often done using password recovery tools, this has led to attackers using the same technique to obtain access to weak frameworks and infrastructures. The study conducted two trials of strength assessment for (1) weak password and (2) strong password using a Cain & Abel to show the potential risks of both passwords. Two procedures were used for the strength assessment: brute force and dictionary attacks. The findings of this study shows that passwords containing only uppercase and lowercase letters with numbers (3 to 8 characters) are easily exploited. The study concluded that using strong passwords prevent potential cybersecurity attacks because strong passwords require more resources, power, and time to hack.\",\"PeriodicalId\":388509,\"journal\":{\"name\":\"Proceedings of the 8th International Conference on Management of e-Commerce and e-Government\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th International Conference on Management of e-Commerce and e-Government\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3483816.3483820\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Management of e-Commerce and e-Government","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3483816.3483820","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Password Strength Assessment on a Laptop Device using an Online Password Recovery Tool — Cain & Abel
Password cracking procedures are often done using password recovery tools, this has led to attackers using the same technique to obtain access to weak frameworks and infrastructures. The study conducted two trials of strength assessment for (1) weak password and (2) strong password using a Cain & Abel to show the potential risks of both passwords. Two procedures were used for the strength assessment: brute force and dictionary attacks. The findings of this study shows that passwords containing only uppercase and lowercase letters with numbers (3 to 8 characters) are easily exploited. The study concluded that using strong passwords prevent potential cybersecurity attacks because strong passwords require more resources, power, and time to hack.