Skip to main content

Montenegrin Dictionary Based Brute Force Attack

  • Conference paper
  • First Online:
  • 1308 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 128))

Abstract

Cyber-attacks and cyber-crimes are growing quickly and users are becoming unsafe on the internet. Cyber threats will put users increasingly at risk. For that reason statistical analysis have been done in order to determine how strong passwords are in the area of Montenegro, and to determine if there is a way to crack them by using brute force attack. Brute force attack or attack by “force” is based on cracking the password with all possible combinations, including cracking Wi-Fi routers, social media account, e-mails, hashes, zip or pdf files protected by password, internet protocols (telnet, ftp, http, https, smb.) etc. We will explain brute force attack for cracking passwords based on statistical analysis data in Montenegro. The first reason we will be doing this is to improve security, password strength, and the conscience of the people in Montenegro. The second reason is to help the people in law enforcement who deal with digital forensics, to find digital evidence in cyber incidents in the shortest amount of time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bošnjak, L., Sreš, J. Brumen, B.: Brute-force and dictionary attack on hashed real-world passwords. In: 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE (2018)

    Google Scholar 

  2. Juels, A., Rivest, R.L.: Honeywords: making password-cracking detectable. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 145–160. ACM, November 2013

    Google Scholar 

  3. Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: 2010 Fourth International Conference on Network and System Security, pp. 583–587. IEEE, September 2010

    Google Scholar 

  4. Beggs, R.W.: Mastering Kali Linux for Advanced Penetration Testing. Packt Publishing Ltd., Birmingham (2014)

    Google Scholar 

  5. d’Otreppe, T.: Aircrack-ng (2019)

    Google Scholar 

  6. Solar Designer: John the ripper (2003). http://www.openwall.com/john/

  7. Najera-Gutierrez, G., Ansari, J.A.: Web Penetration Testing with Kali Linux: Explore the Methods and Tools of Ethical Hacking with Kali Linux. Packt Publishing Ltd., Birmingham (2018)

    Google Scholar 

  8. Chester, J.A.: Analysis of Password Cracking Methods & Applications (2015)

    Google Scholar 

  9. Ying, H.M., Thing, V.L.: A novel rainbow table sorting method. In: International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS), February 2011

    Google Scholar 

  10. Wright, K.B.: Researching internet-based populations: advantages and disadvantages of online survey research, online questionnaire authoring software packages, and web survey services. J. Comput.-Mediated Commun. 10(3), 1034 (2005)

    Google Scholar 

  11. Sanghvi, H.P., Dahiya, M.S.: Cyber reconnaissance: an alarm before cyber attack. Int. J. Comput. Appl. 63(6), 36–38 (2013)

    Google Scholar 

  12. Zelle, J.M.: Python Programming: an Introduction to Computer Science. Franklin, Beedle & Associates Inc, Portland (2004)

    Google Scholar 

  13. Velu, V.K.: Mastering Kali Linux for Advanced Penetration Testing. Packt Publishing Ltd., Birmingham (2017)

    Google Scholar 

  14. Van Tilborg, H.C., Jajodia, S. (eds.): Encyclopedia of Cryptography and Security. Springer, Heidelberg (2014)

    MATH  Google Scholar 

  15. Chanda, K.: Password security: an analysis of password strengths and vulnerabilities. Int. J. Comput. Netw. Inf. Secur. 8(7), 23 (2016)

    Google Scholar 

  16. Jourdan, P., Stavrou, E.: Towards designing advanced password cracking toolkits: optimizing the password cracking process (2019)

    Google Scholar 

Download references

Acknowledgment

This paper is prepared within two projects - COST CA17124 “Digital forensics: evidence analysis via intelligent systems and practices” and “Piloting a blockchain-based capital market system in Montenegro”, supported by Ministry of Science of Montenegro and Ministry of science and technology of Peoples Republic of China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Milena Djukanovic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Djukanovic, M., Novicevic, L., Jovanovic, M. (2020). Montenegrin Dictionary Based Brute Force Attack. In: Karabegović, I. (eds) New Technologies, Development and Application III. NT 2020. Lecture Notes in Networks and Systems, vol 128. Springer, Cham. https://doi.org/10.1007/978-3-030-46817-0_61

Download citation

Publish with us

Policies and ethics