Cracking a password can involve different schemes, which involve several different approaches and strategies. This usually includes database access with protected passwords. Serval classic approaches include data dictionary, brute-force, and rainbow attacks. Although there are numerous tools such as Hextools and Hashcat, your job is to come up with strategy that is based on a (subset) of industry-related software deliverables that address this security breach. Use the following parametersto guide you:
• A Conceptual Approach that should include a Problem Domain Statament (e.g. Government Securitydomain) and the associated Requirements.
1. Key-up/Key-down: The time it takes to release one key vs the press of the next one.
2. Key-down/Key-up: The overall time it takes to release the key pressure of the next consecutive key where the use of a two simultaneous key pattern can occur such as double ASCII (or Unicode) code is entered or two or more devices (independent standalone
Comments
Leave a comment