Essays about: "dictionary attack"
Found 5 essays containing the words dictionary attack.
-
1. A case study of unauthorized login attempts against honeypots via remote desktop
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE
-
2. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE
-
3. Digital incursion: Breaching the android lock screen and liberating data
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE
-
4. Hacking a Wi-Fi based drone
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Unmanned Aerial Vehicles, often called drones or abbreviated as UAVs, have been popularised and used by civilians for recreational use since the early 2000s. A majority of the entry- level commercial drones on the market are based on a WiFi connection with a controller, usually a smart phone. READ MORE
-
5. A shoulder-surfing resistant graphical password system
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. READ MORE