Essays about: "dictionary attack"

Found 5 essays containing the words dictionary attack.

  1. 1. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE

  2. 2. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Yasser Zarzour; Mohamad Alchtiwi; [2023]
    Keywords : Password security; password-guessing tool; password-guessing method; password-guessing technique; offline attack; Swedish password leak; Lösenordssäkerhet; lösenordsgissningsverktyg; lösenordsgissningsmetoder; lösenordsgissningstekniker; offline attack; svenska lösenordsläckor;

    Abstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE

  3. 3. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE

  4. 4. Hacking a Wi-Fi based drone

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Rubbestad; William Söderqvist; [2021]
    Keywords : unmanned aerial vehicles; ethical hacking; threat modelling; penetration testing; ryze tello; drönare; etisk hackning; hotmodellering; penetrationstest; ryze tello;

    Abstract : Unmanned Aerial Vehicles, often called drones or abbreviated as UAVs, have been popularised and used by civilians for recreational use since the early 2000s. A majority of the entry- level commercial drones on the market are based on a WiFi connection with a controller, usually a smart phone. READ MORE

  5. 5. A shoulder-surfing resistant graphical password system

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Elias Alesand; Hanna Sterneling; [2017]
    Keywords : shoulder-surfing; resistant; graphical password system; guessing attacks; graphical passwords; recognition-based; recall-based; pure recall-based; password; security; password space; pictorial superiority effect; brute-force attack; dictionary attack; hot-spots; memorability; graphical components; authentication;

    Abstract : The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. READ MORE