Analysis the strength of passwords resistance to a everyday hacker
In this project we are making our own password strategy that will provide a good memorability and also a good security. We check the memorability by conducting a test in which every user has to input the password by the given strategy instruction that help them out to remrmber the password wh
2025-06-28 16:25:07 - Adil Khan
Analysis the strength of passwords resistance to a everyday hacker
Project Area of Specialization Cyber SecurityProject SummaryIn this project we are making our own password strategy that will provide a good memorability and also a good security.
We check the memorability by conducting a test in which every user has to input the password by the given strategy instruction that help them out to remrmber the password while on the other hand the security will be check by applying different attacks and it will be done on Kali Linux.
Project ObjectivesThe main purpose of this password strategy is to create a powerful password that will be unique, unforgettable, lengthy, sheilded and non sensible.
Project Implementation MethodFirst we searched about many different password techniques and their pros and cons in both security and memorability wise.
Then we created our own password scheme based on what we learned but somehow different.
This password scheme will show good results for both memorability and security, which are two most important factors of any password creation.
Then we started a surgery among 10 students to test our strategy and checked it's memorability.
Next step would be security which can never be sacrifice.
For this, we are using Kali Linux OS which provides best results for password cracking. Here we will use hashcat tool where we will test different attacks like brute force attack, dictionary attack, Markov model etc.
The last step will be, to write results and check if there is any improvement from previous strategies.
Our motive is to create a password that is memorable and secure at the same time because some password strategy donot provide both things at the same time that could not satisfy the user.
The good security will provide protection against unauthorized access while good memorability provide ease to user that they do not have to remember it.
Technical Details of Final DeliverableIn this project, the technology we are using is Kali Linux.
The open-source Kali Linux OS allows pen testers use the same exploits as malevolent, would-be hackers – tasks that would be needlessly difficult or impossible with a standard OS.
In this OS, we will focus on hashcat tool.
Hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, and has facilities to help enable distributed password cracking.
Hashcat offers multiple attack modes for obtaining effective and complex coverage over a hash’s keyspace. These modes are:
Brute-Force attack
Combinator attack
Dictionary attack
Fingerprint attack
Hybrid attack
Mask attack
Permutation attack
Rule-based attack
Table-Lookup attack
Toggle-Case attack
PRINCE attack
We will test our strategy with brute force attack, dictionary attack and markov model (a different kind of attack).
Final Deliverable of the Project Software SystemCore Industry SecurityOther IndustriesCore Technology OthersOther TechnologiesSustainable Development Goals Good Health and Well-Being for People, Quality EducationRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 10000 | |||
| Hashcat Tool | Miscellaneous | 1 | 2000 | 2000 |
| PC machine | Miscellaneous | 1 | 8000 | 8000 |