Password-cracking
Nowadays passwords are not stored in clear text but as hash values. Your task is to find techniques to receive the original password out of a hash value. Describe the different tools/possibilities you find. What are the common techniques for password-cracking? What techniques exist to avoid cracking? Finally, you have to generate an own password-hash and crack it.
Solution preview for the order on password-cracking
APA
217 words