Abstract
Cyber-attacks and cyber-crimes are growing quickly and users are becoming unsafe on the internet. Cyber threats will put users increasingly at risk. For that reason statistical analysis have been done in order to determine how strong passwords are in the area of Montenegro, and to determine if there is a way to crack them by using brute force attack. Brute force attack or attack by “force” is based on cracking the password with all possible combinations, including cracking Wi-Fi routers, social media account, e-mails, hashes, zip or pdf files protected by password, internet protocols (telnet, ftp, http, https, smb.) etc. We will explain brute force attack for cracking passwords based on statistical analysis data in Montenegro. The first reason we will be doing this is to improve security, password strength, and the conscience of the people in Montenegro. The second reason is to help the people in law enforcement who deal with digital forensics, to find digital evidence in cyber incidents in the shortest amount of time.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bošnjak, L., Sreš, J. Brumen, B.: Brute-force and dictionary attack on hashed real-world passwords. In: 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE (2018)
Juels, A., Rivest, R.L.: Honeywords: making password-cracking detectable. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 145–160. ACM, November 2013
Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: 2010 Fourth International Conference on Network and System Security, pp. 583–587. IEEE, September 2010
Beggs, R.W.: Mastering Kali Linux for Advanced Penetration Testing. Packt Publishing Ltd., Birmingham (2014)
d’Otreppe, T.: Aircrack-ng (2019)
Solar Designer: John the ripper (2003). http://www.openwall.com/john/
Najera-Gutierrez, G., Ansari, J.A.: Web Penetration Testing with Kali Linux: Explore the Methods and Tools of Ethical Hacking with Kali Linux. Packt Publishing Ltd., Birmingham (2018)
Chester, J.A.: Analysis of Password Cracking Methods & Applications (2015)
Ying, H.M., Thing, V.L.: A novel rainbow table sorting method. In: International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS), February 2011
Wright, K.B.: Researching internet-based populations: advantages and disadvantages of online survey research, online questionnaire authoring software packages, and web survey services. J. Comput.-Mediated Commun. 10(3), 1034 (2005)
Sanghvi, H.P., Dahiya, M.S.: Cyber reconnaissance: an alarm before cyber attack. Int. J. Comput. Appl. 63(6), 36–38 (2013)
Zelle, J.M.: Python Programming: an Introduction to Computer Science. Franklin, Beedle & Associates Inc, Portland (2004)
Velu, V.K.: Mastering Kali Linux for Advanced Penetration Testing. Packt Publishing Ltd., Birmingham (2017)
Van Tilborg, H.C., Jajodia, S. (eds.): Encyclopedia of Cryptography and Security. Springer, Heidelberg (2014)
Chanda, K.: Password security: an analysis of password strengths and vulnerabilities. Int. J. Comput. Netw. Inf. Secur. 8(7), 23 (2016)
Jourdan, P., Stavrou, E.: Towards designing advanced password cracking toolkits: optimizing the password cracking process (2019)
Acknowledgment
This paper is prepared within two projects - COST CA17124 “Digital forensics: evidence analysis via intelligent systems and practices” and “Piloting a blockchain-based capital market system in Montenegro”, supported by Ministry of Science of Montenegro and Ministry of science and technology of Peoples Republic of China.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Djukanovic, M., Novicevic, L., Jovanovic, M. (2020). Montenegrin Dictionary Based Brute Force Attack. In: Karabegović, I. (eds) New Technologies, Development and Application III. NT 2020. Lecture Notes in Networks and Systems, vol 128. Springer, Cham. https://doi.org/10.1007/978-3-030-46817-0_61
Download citation
DOI: https://doi.org/10.1007/978-3-030-46817-0_61
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-46816-3
Online ISBN: 978-3-030-46817-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)