How Easily Can
Your Password
Be Hacked?
s1240190 Yuto Shoji
Abstract
› How secure in the password that we use
every day?
› How hard someone guess our password?
Credits
› Python™ is a registered trademark of Python
Software Foundation.
› Microsoft® is a registered trademark of
Microsoft Corporation.
› Apple® and Mac® are registered trademarks
of Apple Inc.
› Raspberry Pi® is a trademark of the Raspberry
Pi Foundation.
› Linux® is a registered trademark of Linus
Torvalds.
Based on the following cite
› http://www.sciencebuddies.org/science-
fair-
projects/project_ideas/CompSci_p046.sht
ml
Introduction
› Strong computer passwords are important
to protect our information on computer
system.
How to create strong
passwords
› Use totally random password generator from
an online.
› Think about passphrase which is phrase you
like or a quote from a movie. Then use the first
letter of each words and put in a number or
punctuation in there somewhere.
› Use two completely unrelated words and
separate them by numbers or characters.
› Consider pronounceable random password
Like “USiFiPiZOG”
Examples of Password type
› Easy to guess based on personal knowledge:
pie314
› Pronounceable random: USiFiPiZOG
› Completely random (hard to guess) :
9J8LZcWAMzjJQUnD
› Passphrase: T4IdtwiKa (Toto, 4I don't think
we're in Kansas anymore)
› Two unrelated words: deaf+anteater
› Two unrelated words + personal info:
deaf555+4715anteater
Refer to Bibliography to write
this presentation
› Imperva Application Defense Center. (2010). Consumer Password
Worst Practices. Retrieved January 9, 2014 from
http://www.imperva.com/download.asp?id=239
› Burnett, M. (2012, September 5). 6 New Password Rules. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/new-
password-rules
› Burnett, M. (2011, June 13). How I Collect Passwords. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/how-i-
collect-passwords
› Lucas, I. (2009, July 10). Password Recovery Speeds.
Lockdown.co.uk - The Home Computer Security Centre. Retrieved
January 9, 2014 from http://www.lockdown.co.uk/?pg=combi
› Shaffer, G. (2012). Good and Bad Passwords How-To. GeodSoft.
Retrieved January 9, 2014 from
http://geodsoft.com/howto/password/cracking_passwords.htm
Materials
› Computer with any type of web browser
› Lab notebook
› Pencil or pen
› Calculator
› Optional: Python software running on a
computer. We recommend Python 3, and the
example code we provide is written for
Python 3.
› Optional, but recommended: Python 3
reference book
Cracking a Password
› We consider how to crack about cash
box lock has three dials.
Cracking method 1
› Count from 0 to 999 and try all patterns to
unlock.
Cracking method 2
› Simulate the 62-character dial. The code
start with one dial and tries all 62
possibilities. Next tries all 62^2 possibilities.
After that tries all 62^3 possibilities.
Cracking method 3
› Simulate a list of passwords that people
often use.
Cracking method 4
› Simulate the combination of words and
other characters. Then use a number or
punctuation in between two words.
Finally
› Consider about passwords is very
important for our secure life.

English presentation for English class

  • 1.
    How Easily Can YourPassword Be Hacked? s1240190 Yuto Shoji
  • 2.
    Abstract › How securein the password that we use every day? › How hard someone guess our password?
  • 3.
    Credits › Python™ isa registered trademark of Python Software Foundation. › Microsoft® is a registered trademark of Microsoft Corporation. › Apple® and Mac® are registered trademarks of Apple Inc. › Raspberry Pi® is a trademark of the Raspberry Pi Foundation. › Linux® is a registered trademark of Linus Torvalds.
  • 4.
    Based on thefollowing cite › http://www.sciencebuddies.org/science- fair- projects/project_ideas/CompSci_p046.sht ml
  • 5.
    Introduction › Strong computerpasswords are important to protect our information on computer system.
  • 6.
    How to createstrong passwords › Use totally random password generator from an online. › Think about passphrase which is phrase you like or a quote from a movie. Then use the first letter of each words and put in a number or punctuation in there somewhere. › Use two completely unrelated words and separate them by numbers or characters. › Consider pronounceable random password Like “USiFiPiZOG”
  • 7.
    Examples of Passwordtype › Easy to guess based on personal knowledge: pie314 › Pronounceable random: USiFiPiZOG › Completely random (hard to guess) : 9J8LZcWAMzjJQUnD › Passphrase: T4IdtwiKa (Toto, 4I don't think we're in Kansas anymore) › Two unrelated words: deaf+anteater › Two unrelated words + personal info: deaf555+4715anteater
  • 8.
    Refer to Bibliographyto write this presentation › Imperva Application Defense Center. (2010). Consumer Password Worst Practices. Retrieved January 9, 2014 from http://www.imperva.com/download.asp?id=239 › Burnett, M. (2012, September 5). 6 New Password Rules. Xato. Retrieved January 9, 2014 from https://xato.net/passwords/new- password-rules › Burnett, M. (2011, June 13). How I Collect Passwords. Xato. Retrieved January 9, 2014 from https://xato.net/passwords/how-i- collect-passwords › Lucas, I. (2009, July 10). Password Recovery Speeds. Lockdown.co.uk - The Home Computer Security Centre. Retrieved January 9, 2014 from http://www.lockdown.co.uk/?pg=combi › Shaffer, G. (2012). Good and Bad Passwords How-To. GeodSoft. Retrieved January 9, 2014 from http://geodsoft.com/howto/password/cracking_passwords.htm
  • 9.
    Materials › Computer withany type of web browser › Lab notebook › Pencil or pen › Calculator › Optional: Python software running on a computer. We recommend Python 3, and the example code we provide is written for Python 3. › Optional, but recommended: Python 3 reference book
  • 10.
    Cracking a Password ›We consider how to crack about cash box lock has three dials.
  • 11.
    Cracking method 1 ›Count from 0 to 999 and try all patterns to unlock.
  • 12.
    Cracking method 2 ›Simulate the 62-character dial. The code start with one dial and tries all 62 possibilities. Next tries all 62^2 possibilities. After that tries all 62^3 possibilities.
  • 13.
    Cracking method 3 ›Simulate a list of passwords that people often use.
  • 14.
    Cracking method 4 ›Simulate the combination of words and other characters. Then use a number or punctuation in between two words.
  • 15.
    Finally › Consider aboutpasswords is very important for our secure life.