Cracking - Brute Forcing - Dictionary and Cryptanalysis attacks:
Cracking is generally defined by the degrading or decrypting of an encrypted element or object that contains the desired information. For discussion in this site, cracking is most closely related to the discovery of the password from an algorithmic hash based on a known encryption method. Typical encryption methods include, but are not limited to the following:
- LM and NTLM
- MD (Message Digest) 2, 4, and 5
- Cisco PIX password encryption
- MySQL, MySQL323, SHA1, ripemd160
The following tutorials are provided in an attempt to explain, in clear terms, the actual steps required to perform the following “Cracking” or “Assessment” techniques. These techniques should be incorporated in every routine self-assessment and contracted Vulnerability Risk Assessment that you perform. If your organization is planning for, or has already endured a vulnerability risk assessment, you should expect this to be performed as part of the assessment process.