A Review on Password Cracking Strategies
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
As the word itself implies, Personal Account Security S ystem WORD (PASS WORD) is a word or string of characters used for user authentication to prove identity. But now passwords are going cracked to gain unauthorized access to a computer without the computer owner’s awareness. The proposed paper is based on a study of certain password cracking strategies used for cracking. Methods like dictionary attack, brute force attack, shoulder surfing, phishing, guessing, spidering etc makes a bad impact on those passwords which are easy to guess and most commonly used. This paper compares and evaluates the different password cracking techniques, presents certain password hacking tools and also certain preventive methods.
Authors and Affiliations
Ms. Vidya Vijayan, Ms. Josna P Joy, Mrs. Suchithra M S
Mobile Ad Hoc Networks Authentication Using NPV Method.
NPV (neighbour position verification) method is companionable with security architectures counting the ones that havebeen projected for vehicular networks whichsymbolize a likely deployment environment for NPV.Such a...
A Wavelet Domain Approach Based On DT-CWT For Satellite Image Processing
A DT-CWT-based nonlocal-means-based RE (DT-CWTNLM-RE) strategy is proposed, utilizing the DT-CWT, Lanczos addition, and NLM. Note that DT-CWT is almost move invariant and directional specific. In addition, DTCWT safegu...
Addressing MDX Injection issue in Big Data using ASCII Based String Matching
MDX injection is one of the most threats for application written for Web. Big data is the ability of providing exponential growth and availability of data. Since the data in here are unstructured and therefore normal...
Effective Integration of Voltage Source Converters (VSCs) in weak grids
A New control topology is presented in this paper to have an effective integration of voltage source converters (VSCs) in weak grids. Even though the controller emulates the dynamic performance of synchronous machine...
Implementation of Dejong Function By Various Selection Method And Analyze Their Performance
Genetic algorithm is the search and optimization technique. Genetic algorithm solves highly mathematical and simulation problems. In this paper researcher implements the dejong function1(sphere model) with the help o...