part4 and part5
This commit is contained in:
parent
3b51341726
commit
87efb6dbf4
7 changed files with 70 additions and 1 deletions
Binary file not shown.
BIN
Lab04/content/part2/bigrams.xlsx
Normal file
BIN
Lab04/content/part2/bigrams.xlsx
Normal file
Binary file not shown.
|
@ -3,3 +3,4 @@ jonas:$1$qPEx/5/4$4T0lDrIo5RnrDFH2rP7In/
|
||||||
pony:$1$q1NwfAWz$5ulIYzhCjsLBsQjQ2CRRN1
|
pony:$1$q1NwfAWz$5ulIYzhCjsLBsQjQ2CRRN1
|
||||||
hannah:$1$ia1yKsCX$/Xdet.pCmIR3TdKoavIaP/
|
hannah:$1$ia1yKsCX$/Xdet.pCmIR3TdKoavIaP/
|
||||||
root:$1$E2ST/4kf$6UnJsquPTK3S2lpLxShE/.
|
root:$1$E2ST/4kf$6UnJsquPTK3S2lpLxShE/.
|
||||||
|
florian:$1$AIi8cXMh$eiuFpI7YUjEvLaoq5mfss.
|
BIN
Lab04/documentation/images/part4/john.png
Normal file
BIN
Lab04/documentation/images/part4/john.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 22 KiB |
|
@ -30,7 +30,7 @@
|
||||||
\definecolor{backcolour}{rgb}{0.95,0.95,0.92}
|
\definecolor{backcolour}{rgb}{0.95,0.95,0.92}
|
||||||
\definecolor{weborange}{rgb}{1,0.65,0}
|
\definecolor{weborange}{rgb}{1,0.65,0}
|
||||||
|
|
||||||
\usepackage{fancyvrb}
|
\usepackage{fancyvrb,amsmath}
|
||||||
\RecustomVerbatimCommand{\VerbatimInput}{VerbatimInput}%
|
\RecustomVerbatimCommand{\VerbatimInput}{VerbatimInput}%
|
||||||
{fontsize=\footnotesize,
|
{fontsize=\footnotesize,
|
||||||
commandchars=\|\(\), % escape character and argument delimiters for
|
commandchars=\|\(\), % escape character and argument delimiters for
|
||||||
|
@ -113,6 +113,7 @@
|
||||||
\include{part2/part2}
|
\include{part2/part2}
|
||||||
\include{part3/part3}
|
\include{part3/part3}
|
||||||
\include{part4/part4}
|
\include{part4/part4}
|
||||||
|
\include{part5/part5}
|
||||||
|
|
||||||
\printbibliography[title=Literaturverzeichnis]
|
\printbibliography[title=Literaturverzeichnis]
|
||||||
|
|
||||||
|
|
|
@ -1,3 +1,25 @@
|
||||||
\section{Part 4: Password Hashing and Cracking}
|
\section{Part 4: Password Hashing and Cracking}
|
||||||
|
|
||||||
|
\subsection{MD5 Hash}
|
||||||
|
|
||||||
|
MD5 hash mit password aus Liste:
|
||||||
|
|
||||||
|
\begin{verbatim}
|
||||||
|
openssl passwd -1 !Florian
|
||||||
|
\end{verbatim}
|
||||||
|
|
||||||
|
\subsection{John}
|
||||||
|
|
||||||
|
cracking it with john:
|
||||||
|
|
||||||
|
\begin{verbatim}
|
||||||
|
john --wordlist=crackstation.txt --format=md5crypt hashes.txt --fork=8
|
||||||
|
\end{verbatim}
|
||||||
|
|
||||||
|
\begin{figure}[H]
|
||||||
|
\begin{center}
|
||||||
|
\includegraphics[width=0.9\textwidth]{part4/john}
|
||||||
|
\caption{John}
|
||||||
|
\label{fig:John}
|
||||||
|
\end{center}
|
||||||
|
\end{figure}
|
||||||
|
|
45
Lab04/documentation/part5/part5.tex
Normal file
45
Lab04/documentation/part5/part5.tex
Normal file
|
@ -0,0 +1,45 @@
|
||||||
|
\section{Part 5: Asymmetric Encryption}
|
||||||
|
|
||||||
|
\subsection{Generierte Primzahlen}
|
||||||
|
|
||||||
|
\begin{verbatim}
|
||||||
|
openssl prime -generate -bits 8
|
||||||
|
\end{verbatim}
|
||||||
|
|
||||||
|
\begin{verbatim}
|
||||||
|
prime1 = 211, prime2 = 223, prime3 = 227, e=11
|
||||||
|
\end{verbatim}
|
||||||
|
|
||||||
|
\subsection{Berechnungen}
|
||||||
|
|
||||||
|
\begin{align}
|
||||||
|
d = e^{-1} mod ((prime1-1)(prime2-1)) \\
|
||||||
|
d = 11^{-1} mod ((211-1)(223-1)) = 21191
|
||||||
|
\end{align}
|
||||||
|
|
||||||
|
\begin{verbatim}
|
||||||
|
g = 9, x = 2, y = 3
|
||||||
|
\end{verbatim}
|
||||||
|
|
||||||
|
\begin{align}
|
||||||
|
a = g^{x} (mod\ prime3) = 9^{2} (mod\ 227) = 81 \\
|
||||||
|
b = g^{y} (mod\ prime3) = 9^{3} (mod\ 227) = 48 \\
|
||||||
|
k_{1} = b^{x}(mod\ prime3) = 48^{2}(mod\ 227) = 34 \\
|
||||||
|
k_{2} = a^{y}(mod\ prime3) = 81^{3}(mod\ 227) = 34 \\
|
||||||
|
k = k_{1} = k_{2} = 34
|
||||||
|
\end{align}
|
||||||
|
|
||||||
|
\subsection{Fragen}
|
||||||
|
|
||||||
|
1. What attack is the Diffie-Hellman key exchange vulnerable to?
|
||||||
|
|
||||||
|
Man in the Middle attacks
|
||||||
|
|
||||||
|
2. What measures can be taken to prevent this type of attack?
|
||||||
|
|
||||||
|
RSA Encryption
|
||||||
|
|
||||||
|
3. For the Diffie-Hellman, a generator g is used. Explain what a generator is and how can it be found
|
||||||
|
|
||||||
|
4. Show why for the primes 61,23 and the public key e=60 no private key d can be found
|
||||||
|
|
Reference in a new issue