Analysis the strength of passwords resistance to a everyday hacker

In this project we are making our own password strategy that will provide a good memorability and also a good security. We check the memorability by conducting a test in which every user has to input the password by the given strategy instruction that help them out to remrmber the password wh

2025-06-28 16:25:07 - Adil Khan

Project Title

Analysis the strength of passwords resistance to a everyday hacker

Project Area of Specialization Cyber SecurityProject Summary

In this project we are making our own password strategy that will provide a good memorability and also a good security.

We check the memorability by conducting a test in which every user has to input the password by the given strategy instruction that help them out to remrmber the password while on the other hand the security will be check by applying different attacks and it will be done on Kali Linux.

Project Objectives

The main purpose of this password strategy is to create a powerful password that will be unique, unforgettable, lengthy, sheilded and non sensible.

Project Implementation Method

First we searched about many different password techniques and their pros and cons in both security and memorability wise.
Then we created our own password scheme based on what we learned but somehow different.
This password scheme will show good results for both memorability and security, which are two most important factors of any password creation. 
Then we started a surgery among 10 students to test our strategy and checked it's memorability.
Next step would be security which can never be sacrifice.
   For this, we are using Kali Linux OS which provides best results for password cracking. Here we will use hashcat tool where we will test different attacks like brute force attack, dictionary attack, Markov model etc.
The last step will be, to write results and check if there is any improvement from previous strategies.

Benefits of the Project

Our motive is to create a password that is memorable and secure at the same time because some password strategy donot provide both things at the same time that could not satisfy the user.

The good security will provide protection against unauthorized access while good memorability provide ease to user that they do not have to remember it.

Technical Details of Final Deliverable

In this project, the technology we are using is Kali Linux. 
The open-source Kali Linux OS allows pen testers use the same exploits as malevolent, would-be hackers – tasks that would be needlessly difficult or impossible with a standard OS. 
In this OS, we will focus on hashcat tool.
Hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, and has facilities to help enable distributed password cracking.
Hashcat offers multiple attack modes for obtaining effective and complex coverage over a hash’s keyspace. These modes are:

Brute-Force attack
Combinator attack
Dictionary attack
Fingerprint attack
Hybrid attack
Mask attack
Permutation attack
Rule-based attack
Table-Lookup attack
Toggle-Case attack
PRINCE attack

We will test our strategy with brute force attack, dictionary attack and markov model (a different kind of attack).

Final Deliverable of the Project Software SystemCore Industry SecurityOther IndustriesCore Technology OthersOther TechnologiesSustainable Development Goals Good Health and Well-Being for People, Quality EducationRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 10000
Hashcat Tool Miscellaneous 120002000
PC machine Miscellaneous 180008000

More Posts