CS361 Assignment 6
Due: Thursday, December 4, 2014. There won't be any slip
days on this one.
You will be submitting your code electronically to the TA. Make sure
that your code is commented and follows good coding
style. Clearly identify the members of your team (one or two people).
Along with your code, submit a README file explaining your algorithm
and listing which passwords you were and were not able to crack from
the two sample /etc/passwd files. Include timing results showing
how long it took to crack the passwords. You can invent your own
format for this information, but here's a suggestion: start a timer
when you start your program. For each password you discover, print
out the current value of the timer. That way, we'll be able to see
the trend. E.g., did you find a bunch right away and then have to
start working considerable harder, etc.
Make sure that all members of your group understand the code and
contribute equally, as much as possible, to its development.
- The primary file name for this assignment
is PasswordCrack.java. The main method must exist
in PasswordCrack.java. Students can add more files as they
wish but all must be submitted.
- The assignment must be compiled by javac *.java.
- The assignment must be executed by java PasswordCrack inputFile1
inputFile2 where inputFile1 is the dictionary and
inputFile2 is a list of passwords to crack.
- Students must use standard output to print cracked passwords.
Password Cracking: Dictionary Attacks
On a traditional Unix system, passwords are stored in encrypted form
in a world-readable file /etc/passwd. Moreover the encryption
algorithm is widely known. This means that an attacker can attempt to
discover one or more passwords on the system by encrypting a sequence
of strings and comparing the results against the stored encrypted
passwords of the system. If any of the trial encyrptions match stored
encrypted passwords, the attacker will know the corresponding
cleartext password for that user and can then use it to access the
user's account. This is a classic dictionary attack and
explains why many systems enforce rules to ensure that user-generated
passwords are not easily guessed words.
Systematic password guessing involves both cleverness and brute force.
Dictionary attacks are so named because a word list, or dictionary, is
used to generate password guesses. For example, the public Linux
systems at UT have such a dictionary file at /usr/share/dict/words.
A more sophisticated dictionary attack, not only uses common words and
phrases, but also attempts users' surnames, common pet names, etc.
Such words and phrases may be prepended to the dictionary and then
become available in the attack.
A user may attempt to render his or her password unguessable by
"mangling" the plaintext password in some algorithmic way. Some
common "mangles" (ways to take a password and make it less easily
guessable) are listed below. Assume the plaintext password is
"string". You might:
You need only consider characters that you could type from your
keyboard. Weird control characters don't usually occur in passwords.
- prepend a character to the string, e.g., @string;
- append a character to the string, e.g., string9;
- delete the first character from the string, e.g., tring;
- delete the last character from the string, e.g., strin;
- reverse the string, e.g., gnirts;
- duplicate the string, e.g., stringstring;
- reflect the string, e.g., stringgnirts or gnirtsstring;
- uppercase the string, e.g., STRING;
- lowercase the string, e.g., string;
- capitalize the string, e.g., String;
- ncapitalize the string, e.g., sTRING;
- toggle case of the string, e.g., StRiNg or sTrInG;
A program called Crack is available to system administrators to test
the guessability of user passwords, as well as by hackers to perform
dictionary attacks. You can view the documentation for Crack at Crack
The goal of this assignment is to implement a portion of Crack's
functionality and attempt to guess one or more passwords. Input to
your program will be a "captured" /etc/passwd file from a
system with 20 users. Your aim is to crack as many passwords as
possible. But don't expect to crack them all; there are a few
passwords included generated from random strings. If you get 15 or so
passwords, you're doing just fine.
How do you know when to stop? You don't! Write the program to run
until it finds all of the passwords. The TA will stop it when he gets
tired of waiting. Realistically, your program should find a majority
of the passwords (12 or so) in just a few minutes. Make sure that you
print out the passwords as they are found and that you code your
program reasonably efficiently.
To do this for a specific user, you might take the following steps:
Design your program in such a way as to be as efficient as possible.
For example, your program should stop searching with respect to a
given user if you have cracked that password. Consider whether to use
a breadth-first or depth-first search. The algorithm only considers
the first 8 characters of a password, but the user might or might not
take that into account. You do not have to break all passwords, but
you should break at least the simple passwords (generated from words
in the dictionary using one mangle). In general, if you can't break
most of the passwords, you're not trying hard enough.
- Extract the encrypted password and salt for that user (see format
- Seed the word list with words that the user might have
utilized in constructing his or her password (e.g., his first and last
- With the salt and augmented wordlist, systematically
encrypt words and compare against the stored encrypted password;
- Redo step 3, but using mangled versions of the words;
- Redo step 4, attempting to apply two mangles to each word.
For testing purposes, you will be provided with the following files:
After you turn in your program, it will be run against a third
/etc/passwd file, which will not be provided before the turn-in
date. This is to keep everyone honest, since it is completely possible
to just run Crack on the provided files.
- passwd1 - twenty accounts with plain
text passwords provided passwd1 answers
- passwd2 - twenty accounts without plain text passwords
- words - a list of words that you can use as a dictionary
(alternatively, you could use the Unix system dictionary at
/usr/share/dict/words of ~100,000 words,
but expect things to run pretty slowly).
On traditional UNIX system, passwords are encrypted and stored in the
file /etc/passwd. The stored value is actually the result of
encrypting a string of zeros with a key formed from the first eight
characters of your password and a two-character "salt".
The "salt" is a two-character string stored with a user's login
information. Salt is used so that anyone guessing passwords has
to guess on a per-user basis rather than a per-system basis.
Also, in the case that two users have the same password, as long as
they have different salt, their encrypted passwords will not be the
All of the passwords for this project have been encrypted using JCrypt
which can be found on-line at: JCrypt.
JCrypt is a Java implementation of the UNIX Crypt function. JCrypt
includes a method crypt( String salt, String password ) which
will return the encrypted result of a given salt and password. Be
careful--some implementations seem to take the args in the opposite
order: crypt( String password, String salt ).
For example, if a user's plain text password is "amazing" and the salt
is "(b", then JCrypt would return "(bUx9LiAcW8As".
Use JCrypt in your program when checking your password guesses.
Lines in /etc/passwd have the following format, with fields separated by colons:
account:encrypted password data:uid:gid:GCOS-field:homedir:shell
For example, this line represents the account for Tyler Jones.
The salt is "<q".
The encrypted password data field is thirteen characters long.
The first two characters are the salt, and the next eleven characters
are the encrypted password (actually, a string of zeros encrypted with
the salt and the password).
Newer systems make dictionary attacks more difficult by employing
"shadow passwords." In a shadow password system, the password field
in /etc/passwd is replaced with an 'x'. Actual encrypted passwords
are stored in a file /etc/shadow which is not world-readable.
The following are some on-line resources: