Password Cracking

1234567891011121314151617181920
Across
  1. 1. String of characters for authentication and log on computer, web app, software, files, network, etc
  2. 4. OS in which John the ripper, and other Cyber security tools come pre-installed("-" in middle)
  3. 6. Attack uses a list of commonly used passwords to try to gain unauthorized access
  4. 11. Unique Identifier used before a password to Login, and not usually considered Confidential
  5. 12. John the Ripper tool was initially built for which OS?
  6. 13. Open source reporting and collaboration tool for Documentation and Reporting in Cyber Security projects
  7. 15. What is the full form of Fi in Wifi
  8. 16. "- the Ripper". In the name of this tool, who is the Ripper
  9. 17. Evil Twin attack is a type of which attack? ("-" in middle)
  10. 19. Commonly used set of utilities for analyzing networks for weaknesses.
Down
  1. 2. World's most common alphabetic password in organizations usually for high-level access.(Lab password)
  2. 3. Practice where thieves steal your personal data by spying over your shoulder as you use a laptop or ATM("-" in middle)
  3. 5. Another name for web crawling
  4. 7. More efficient version of a Brute Force Attack, when the attacker knows a pattern in the password.("-" in middle)
  5. 8. The answer is in the name. This attack involved making assumptions on what the password might be
  6. 9. This table is a hash function used in Cryptography for storing important data such as passwords
  7. 10. Term for disguising passwords or other data using a reversible transformation
  8. 14. What type of attack involves intercepting and analyzing network traffic to capture login credentials?
  9. 18. Guessing possible combinations of a targetted password. Also known as Exhaustive search.("-" in middle)
  10. 20. Process of guessing or recovering a password from stored data or transmission