Password Cracking
Across
- 1. String of characters for authentication and log on computer, web app, software, files, network, etc
- 4. OS in which John the ripper, and other Cyber security tools come pre-installed("-" in middle)
- 6. Attack uses a list of commonly used passwords to try to gain unauthorized access
- 11. Unique Identifier used before a password to Login, and not usually considered Confidential
- 12. John the Ripper tool was initially built for which OS?
- 13. Open source reporting and collaboration tool for Documentation and Reporting in Cyber Security projects
- 15. What is the full form of Fi in Wifi
- 16. "- the Ripper". In the name of this tool, who is the Ripper
- 17. Evil Twin attack is a type of which attack? ("-" in middle)
- 19. Commonly used set of utilities for analyzing networks for weaknesses.
Down
- 2. World's most common alphabetic password in organizations usually for high-level access.(Lab password)
- 3. Practice where thieves steal your personal data by spying over your shoulder as you use a laptop or ATM("-" in middle)
- 5. Another name for web crawling
- 7. More efficient version of a Brute Force Attack, when the attacker knows a pattern in the password.("-" in middle)
- 8. The answer is in the name. This attack involved making assumptions on what the password might be
- 9. This table is a hash function used in Cryptography for storing important data such as passwords
- 10. Term for disguising passwords or other data using a reversible transformation
- 14. What type of attack involves intercepting and analyzing network traffic to capture login credentials?
- 18. Guessing possible combinations of a targetted password. Also known as Exhaustive search.("-" in middle)
- 20. Process of guessing or recovering a password from stored data or transmission