Abstract
Internet Security is a growing issue within the modern world. One of the weakest links in computer security is the use and misuse of passwords. As knowledge and technology becomes more widely spread, the methods of hacking passwords become increasingly easier and more accessible. With so much data being protected by passwords, it is important that these passwords are properly protected and secure. In this paper we present numerous methods of hacking passwords, as well as preventative measures that you can take to prevent your passwords from being stolen or misused. Two new algorithms are presented under the category of brute force and dictionary attack and compared with John the Ripper, Cain & Abel, and HashCat algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Beaver, K.: Hacking for Dummies. Wiley, Somerset (2012). ProQuest elibrary. Accessed 6 Mar 2016
Gagneja, K.K.: Secure Communication Scheme for Wireless Sensor Networks to maintain Anonymity. IEEE ICNC, Anaheim (2015)
Gagneja, K.K., Nygard, K.: Energy efficient approach with integrated key management scheme for wireless sensor networks. In: ACM MOBIHOC, Bangalore, India, pp. 13–18, 29 July 2013
Gagneja, K.K., Nygard, K.: Heuristic clustering with secured routing in heterogeneous sensor networks. In: IEEE SECON, New Orleans, USA, pp. 9–16, 24–26 June 2013
Gagneja, K.K., Nygard, K.: Pairwise post deployment key management scheme for heterogeneous sensor networks. In: 13th IEEE WoWMoM 2012, San Francisco, California, USA, pp. 1–2, 25–28 June 2012
Gagneja, K.K., Nygard, K.: Key management scheme for routing in clustered heterogeneous sensor networks. In: IEEE NTMS 2012, Security Track, Istanbul, Turkey, pp. 1–5, 7–10 May 2012
Gagneja, K.K.: Knowing the ransomware and building defense against it - specific to health care institutes. In: IEEE MobiSecServ, Miami, USA, February 2017
Jewell, M.T.J.: Maxx Theft Believed Largest Hack Ever, March 2007 www.nbcnews.com. Accessed 07 March 2016
Gagneja, K.K.: Global perspective of security breaches in facebook. In: FECS, Las Vegas, USA, 21–24 July 2014
Evanoff, L., Hatch, N., Gagneja, K.K.: Home network security: beginner vs advanced. In: ICWN, Las Vegas, USA, 27–30 July 2015
Gagneja, K.K., Nygard, K.: A QoS based heuristics for clustering in two-tier sensor networks. In: IEEE FedCSIS, Wroclaw, Poland, pp. 779–784, 9–12 September 2012
McCandless, D.: Ideas, issues, knowledge, data - visualized! (2016). http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/. Accessed 07 Mar 2016
Pepitone, J.: Massive’ credit card data breach involves all major brand, April 2012. http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/index.htm. Accessed 07 Mar 2016
Gagneja, K.K.: Pairwise key distribution scheme for two-tier sensor networks. In: IEEE ICNC, Honolulu, Hawaii, USA, pp. 1081–1086, 3–6 February 2014
John, P.: How I’d Hack Your Weak Passwords, December 2010. lifehacker.com. Accessed 6 Mar 2016
Arvinderpal, S., Gagneja, K.K.: Incident response through behavioral science: an industrial approach. In: IEEE CSCI, LasVegas, USA, 7–9 December 2015
University Alliance. Experts’ View of the Future of Passwords. Villanova University (2016). https://www.villanovau.com/resources/iss/experts-view-password-security-future/#.WXAQOoTyvIU. Accessed 6 Mar 2016
Davey, W.: Top Ten Password Cracking Techniques, 2 December 2011. http://www.alphr.com/features/371158/top-ten-password-cracking-techniques. Accessed 6 Mar 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Gagneja, K., Jaimes, L.G. (2017). Computational Security and the Economics of Password Hacking. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2017. Communications in Computer and Information Science, vol 759. Springer, Cham. https://doi.org/10.1007/978-3-319-65548-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-65548-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65547-5
Online ISBN: 978-3-319-65548-2
eBook Packages: Computer ScienceComputer Science (R0)