CN113139200A - Method, system, computer program and storage medium for quickly cracking password - Google Patents

Method, system, computer program and storage medium for quickly cracking password Download PDF

Info

Publication number
CN113139200A
CN113139200A CN202110508880.3A CN202110508880A CN113139200A CN 113139200 A CN113139200 A CN 113139200A CN 202110508880 A CN202110508880 A CN 202110508880A CN 113139200 A CN113139200 A CN 113139200A
Authority
CN
China
Prior art keywords
cracking
password
file
characteristic value
encryption characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110508880.3A
Other languages
Chinese (zh)
Other versions
CN113139200B (en
Inventor
刘成
吉庆兵
于飞
尹浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN202110508880.3A priority Critical patent/CN113139200B/en
Publication of CN113139200A publication Critical patent/CN113139200A/en
Application granted granted Critical
Publication of CN113139200B publication Critical patent/CN113139200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method, a system, a computer program and a storage medium for quickly cracking a password, wherein the method comprises the following steps of S1: and preprocessing the decryption target to obtain an encryption characteristic value. S2: inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and if so, entering step S5; if there is no corresponding cracking result, the process proceeds to step S3. S3: cracking by adopting a conventional password cracking method, and if the password is cracked successfully, entering the step S4; and if the password is not cracked, ending the whole working process. S4: and writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results. S5: and returning the password obtained by successful cracking to the user. The invention avoids the situation that repeated tasks consume a large amount of computing power, thereby reducing the waste of computing power, time and energy as a whole and improving the success rate and efficiency of password cracking.

Description

Method, system, computer program and storage medium for quickly cracking password
Technical Field
The invention belongs to the field of cryptography, and particularly relates to a method, a system, a computer program and a storage medium for quickly cracking a password.
Background
Cryptography is closely related to our life, for example, setting a personal computer login password can protect our computer data security; the website data security can be protected by setting a website login password; setting a database access password can protect the data security of the database and the like. However, when the user forgets the password set by the user, password cracking software or a system is needed to restore the password, such as Hashcat, Join the Ripper, and the like.
Common password cracking methods in password cracking systems are brute force cracking and dictionary cracking. The most important disadvantage of the enumeration method for decryption is that the calculation amount is large, the decryption efficiency is not high, and if the enumeration range is too large, the decryption time is hard to bear. The dictionary cracking is used by matching the password dictionary with password cracking software, and the password dictionary comprises a plurality of habitually arranged passwords, so that the password cracking success rate and the hit rate of the password cracking software can be improved, and the password cracking time is shortened. However, when the password setting is not regular or complicated and is not contained in the password dictionary, the dictionary cracking method cannot work, and even the time required for password decoding is prolonged.
Therefore, a large amount of computing power is often required in a conventional password cracking method, some cracking tasks occupy dozens of high-performance servers for several months, and some tasks are not avoided to be repeated. No matter which type of repeated task is adopted, a great deal of computing power, time and energy are wasted when repeated cracking tasks are calculated for many times.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method, a system, a computer program and a storage medium for fast cracking passwords, which can realize fast cracking when repeated password cracking tasks are executed and avoid the situation that the repeated tasks consume a large amount of computing power, thereby reducing the waste of computing power, time and energy on the whole and improving the success rate and the efficiency of cracking the passwords.
The purpose of the invention is realized by the following technical scheme:
the invention provides a quick password cracking method, which comprises the following steps:
s1: preprocessing a decryption target to obtain an encryption characteristic value;
s2: inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and if so, entering step S5; if no corresponding cracking result exists, the step S3 is executed; when the corresponding cracking results exist in the corresponding tables of the encryption characteristic values and the cracking results, the working process only traverses the corresponding tables of the encryption characteristic values and the cracking results, and does not execute the conventional password cracking process.
S3: cracking by adopting a conventional password cracking method, and if the password is cracked successfully, entering the step S4; if the password is not cracked, the whole working process is ended;
s4: writing the password obtained by successful cracking into an encryption characteristic value and cracking result corresponding table;
s5: and returning the password obtained by successful cracking to the user.
Further, step S1 includes the following sub-steps:
s11: judging the type of the decryption target, and if the decryption target is a characteristic value, directly entering step S2; if the decryption target is a file, the process proceeds to step S12;
s12: judging the file type, and if the file is an encrypted characteristic value file, entering step S14; if the file is not the encrypted feature value file, the process proceeds to step S13;
s13: extracting an encryption characteristic value of the file;
s14: and reading the encrypted characteristic value of the file.
Further, the method for judging the file type comprises the steps of analyzing the file header and judging according to the file suffix name.
Further, step S13 includes the following sub-steps:
s131: calling a corresponding feature extraction script according to the file type to extract features of the file, if the file is an encrypted file, obtaining an encrypted feature value after the feature value is successfully extracted, and entering the step S14; and if the file is the non-encrypted file, ending the whole working process.
Further, if the feature extraction fails, an error is reported and the whole working process is ended.
Further, after the password is cracked successfully, judging a cracking mode, and if a non-dictionary cracking mode is adopted, writing the password obtained after cracking successfully into the text dictionary. By writing the password obtained by the non-dictionary cracking mode into the text dictionary, brute force cracking is not needed when the task with different encryption characteristic values but the same password is cracked next time, and the calculation power and time are saved.
The application provides a rapid password cracking system which comprises a file type judging module, an encryption characteristic value extracting module, an encryption characteristic value reading module, an encryption characteristic value and cracking result corresponding table, a password cracking module, a password cracking and warehousing module and a result inquiring module;
the file type judging module is used for judging the type of the decryption target file;
the encrypted characteristic value extraction module is used for extracting the encrypted characteristic value of the file;
the encryption characteristic value reading module is used for reading the encryption characteristic value of the file;
the encryption characteristic value and cracking result corresponding table is used for storing a password corresponding to the encryption characteristic value;
the password cracking and entering module is used for writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results;
the password cracking module is used for carrying out conventional password cracking on the encryption characteristic values which cannot find the corresponding password in the corresponding table of the encryption characteristic values and the cracking results;
and the result query module is used for returning the cracking result to the user.
Further, the system also comprises a text dictionary, and the password cracking and entering module is also used for writing the password obtained after the password is cracked successfully through the non-dictionary cracking mode into the text dictionary.
In another aspect, the present application provides a computer program comprising computer program instructions, wherein the program instructions, when executed by a processor, are configured to implement any one of the above methods for quick password cracking.
In another aspect, the present application provides a storage medium having computer program instructions stored thereon, wherein the program instructions, when executed by a processor, are used to implement any one of the above-mentioned methods for quick password cracking.
The invention has the beneficial effects that: by combining the established encryption characteristic value and cracking result corresponding table with a text dictionary, the task with the same encryption characteristic value and the task with the same cracking result password can be simply and efficiently cracked, the repeated tasks can be quickly cracked, the situation that the repeated tasks consume a large amount of computing power is avoided, the computing power, time and energy are integrally reduced, and the success rate and the efficiency of password cracking are improved.
Drawings
Fig. 1 is a flow chart of a method for quickly cracking a password according to an embodiment of the present invention;
fig. 2 is a working schematic diagram of a quick password cracking system according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that, in order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments.
Thus, the following detailed description of the embodiments of the present invention is not intended to limit the scope of the invention as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Fig. 1 shows a flow chart of a method for quickly cracking a password according to the preferred embodiment, where the specific flow of the method for quickly cracking a password may be as follows:
step 1, preprocessing a target file.
Specifically, it is first determined whether the decryption target is an encrypted feature value or a file, and if the decryption target is an encrypted feature value, the process directly proceeds to step 2.
If the decryption target is a file, the file type needs to be judged. Specifically, a general file header carries file type information, and the file type can be known by analyzing the file header. It can also be judged together with the file suffix name, for example, doc is MS word of 2003 version, xlsx is MS excel of 2007 version above. If the two methods conflict, the file type obtained by analyzing the file header is used as the standard. In general, the encrypted feature value file is a txt text file, and the encrypted feature value file further includes format files such as doc, docx, xls, xlsx, and the like.
And if the file type is the encrypted characteristic value file, directly reading the encrypted characteristic value from the encrypted characteristic value file.
And if the file type is the non-encrypted characteristic value file, calling a corresponding characteristic extraction script according to the file type to extract the encrypted characteristic value of the file. If the extraction is successful, reading the encrypted characteristic value from the encrypted characteristic value extraction result; if the file is a non-encrypted file, the whole work flow is directly finished; if the extraction fails, for example, the feature extraction script makes an error during the operation, the information of 'extraction failure' and the corresponding error code are returned to the user. It should be noted that there is also a fault-tolerant mechanism, when the file is an unencrypted file, the file type may be an encrypted characteristic value file, and a misjudgment occurs in the previous step, so in this step, when the file type is an encrypted characteristic value file, the encrypted characteristic value is directly read.
Step 2, inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and entering step 5 if the obtained encryption characteristic values have corresponding cracking results; and if the corresponding cracking result does not exist, entering the step 3.
When the corresponding cracking results exist in the corresponding tables of the encryption characteristic values and the cracking results, the work flow only traverses the corresponding tables of the encryption characteristic values and the cracking results, and password cracking is not required to be performed in a brute force cracking or dictionary cracking mode.
And 3, conventional password cracking, creating a password cracking task according to system prompts, and issuing the task to the high-performance computing cluster through the scheduler for execution until the task is finished. If the password is successfully cracked, entering the step 4; if the password is failed to be cracked or abnormal, the whole working process is ended. When password cracking fails, an error code is returned to the user.
And 4, writing the password obtained by successful cracking into the encryption characteristic value and cracking result corresponding table, and quickly searching the password corresponding to the encryption characteristic value at the beginning of the cracking task creation if the next repeated task is a cracking task with the same encryption characteristic value, so as to realize the quick cracking of the same encryption characteristic value.
Meanwhile, after the password obtained by successful cracking is written into the encryption characteristic value and cracking result corresponding table, the method adopted by the conventional password cracking in the step 3 is judged, if a non-dictionary cracking mode is adopted, the password is written into the text dictionary, when the next repeated task is a cracking task with different encryption characteristic values but the same password, although cracking cannot be directly completed through the encryption characteristic value and cracking result corresponding table at the time to obtain the password, the password cracking task can be completed through the text dictionary more quickly than brute force cracking, and the time and the calculation force consumed in cracking the repeated task can be reduced.
And 5, returning the password obtained by successful cracking to the user. At this point the entire workflow is ended.
In the embodiment, the time-consuming comparison test is performed in the same test environment through the quick password cracking method provided by the embodiment in the conventional password cracking.
The encryption characteristic value adopted by the test is as follows:
Figure BDA0003059463570000071
configuration of the test environment:
Figure BDA0003059463570000072
Figure BDA0003059463570000081
the following is a comparison of the time consumed in the present invention and conventional cryptographic break using test encryption feature values in a test environment:
Figure BDA0003059463570000082
the comparison can show that when the password is cracked for the first time, the encryption characteristic value of the decryption target is the encryption characteristic 1, at this time, the cracking result of the encryption characteristic 1 is not recorded in the correspondence table of the encryption characteristic value and the cracking result, and the cracking password corresponding to the encryption characteristic value is not recorded in the text dictionary, which is a 'first task', so that cracking by adopting the rapid password cracking method provided by the embodiment and cracking by adopting the dictionary fail. During the second cracking, the encryption characteristic value of the decryption target is the encryption characteristic 1, the cracking is successful by adopting brute force cracking and the rapid password cracking method provided by the embodiment, and at the moment, the rapid password cracking method provided by the embodiment stores the encryption characteristic 1 and the cracking password corresponding to the encryption characteristic value into the corresponding table of the cracking result. In the third cracking, the encryption characteristic value of the decryption target is the encryption characteristic 1, the conventional password cracking mode adopts dictionary cracking, and the password is not recorded in the text dictionary, so that the cracking fails. In the fourth cracking, the encryption characteristic value of the decryption target is the encryption characteristic 1, and the brute force cracking is adopted in the conventional password cracking mode, so that the time duration is the same as that in the second cracking.
As can be seen from the above cracking of the encryption characteristic 1, when cracking tasks with the same encryption characteristic values are faced, if too many repeated tasks are performed, a conventional password cracking method is adopted, and compared with the password fast cracking method provided in this embodiment, a large amount of time and calculation power are wasted, and the overall task execution efficiency is affected.
And in the fifth cracking, the encryption characteristic value of the decryption target is the encryption characteristic 2, and the password corresponding to the encryption characteristic 2 is the same as the password corresponding to the encryption characteristic 1. Therefore, the conventional password cracking adopts a dictionary cracking mode, the corresponding password is not recorded in the conventional text dictionary, and the corresponding password cannot be found even if the conventional text dictionary is traversed, so that the cracking fails. In the sixth cracking, the encryption characteristic value of the decryption target is the encryption characteristic 2, and the conventional password cracking adopts a brute force cracking mode, so that the decryption is successful after a long time. In the seventh cracking, the password is not recorded in the conventional dictionary cracking method, but the password rapid cracking method provided by the embodiment already obtains the corresponding password when traversing the corresponding table of the encryption characteristic values and the cracking results before creating the conventional cracking task. In the eighth cracking, the conventional brute force cracking method consumes a long time again, and the rapid password cracking method provided by the embodiment already obtains the corresponding password when traversing the corresponding table of the encryption characteristic values and the cracking results before creating the conventional cracking task.
As can be seen from the above cracking of the encryption characteristics 1 and the encryption characteristics 2, when facing cracking tasks with different encryption characteristic values but the same password, the rapid password cracking method provided by the embodiment can greatly reduce the time consumed by the cracking tasks, and improve the success rate and efficiency of password cracking.
According to the rapid password cracking method provided by the embodiment, the built encryption characteristic value and cracking result corresponding table is combined with the text dictionary, so that the tasks with the same encryption characteristic value and the tasks with the same cracking result password can be simply and efficiently cracked, the repeated tasks can be rapidly cracked, the situation that the repeated tasks consume a large amount of computing power is avoided, the waste of computing power, time and energy is integrally reduced, and the success rate and the efficiency of password cracking are improved.
Example 2
As shown in fig. 2, the working schematic diagram of a password fast cracking system according to the preferred embodiment includes a file type determination module, an encryption characteristic value extraction module, an encryption characteristic value reading module, an encryption characteristic value and cracking result correspondence table, a password cracking module, a password cracking storage module, and a result query module.
The file type judging module is used for judging the type of the decryption target file; the encrypted characteristic value extraction module is used for extracting the encrypted characteristic value of the file; the encryption characteristic value reading module is used for reading the encryption characteristic value of the file; the encryption characteristic value and cracking result corresponding table is used for storing a password corresponding to the encryption characteristic value; the password cracking and entering module is used for writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results; the password cracking module is used for carrying out conventional password cracking on the encryption characteristic values which cannot find the corresponding password in the corresponding table of the encryption characteristic values and the cracking results; and the result query module is used for returning the cracking result to the user.
The specific implementation processes of the above system and each module, and the achieved beneficial effects, may refer to the corresponding descriptions in the foregoing embodiment of the password fast cracking method, and for convenience and conciseness of description, no further description is given here.
Example 3
The preferred embodiment provides a computer program, which can implement the steps in any embodiment of the rapid password cracking method provided in the embodiments of the present application, and therefore, the beneficial effects of any rapid password cracking method provided in the embodiments of the present application can be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
Example 4
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor. To this end, an embodiment of the present invention provides a storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to perform the steps of any embodiment of the quick password cracking method provided in the embodiment of the present invention.
Wherein the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium can execute the steps in any of the password quick-cracking method embodiments provided by the embodiments of the present invention, the beneficial effects that any of the password quick-cracking methods provided by the embodiments of the present invention can achieve can be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
The foregoing basic embodiments of the invention and their various further alternatives can be freely combined to form multiple embodiments, all of which are contemplated and claimed herein. In the scheme of the invention, each selection example can be combined with any other basic example and selection example at will. Numerous combinations will be known to those skilled in the art.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A quick password cracking method is characterized in that: the method comprises the following steps:
s1: preprocessing a decryption target to obtain an encryption characteristic value;
s2: inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and if so, entering step S5; if no corresponding cracking result exists, the step S3 is executed;
s3: cracking by adopting a conventional password cracking method, and if the password is cracked successfully, entering the step S4; if the password is not cracked, the whole working process is ended;
s4: writing the password obtained by successful cracking into an encryption characteristic value and cracking result corresponding table;
s5: and returning the password obtained by successful cracking to the user.
2. The rapid password cracking method as claimed in claim 1, wherein: the step S1 includes the following sub-steps:
s11: judging the type of the decryption target, and if the decryption target is a characteristic value, directly entering step S2; if the decryption target is a file, the process proceeds to step S12;
s12: judging the file type, and if the file is an encrypted characteristic value file, entering step S14; if the file is not the encrypted feature value file, the process proceeds to step S13;
s13: extracting an encryption characteristic value of the file;
s14: and reading the encrypted characteristic value of the file.
3. The rapid password cracking method as claimed in claim 2, wherein: the method for judging the file type comprises the steps of analyzing the file header and judging according to the suffix name of the file.
4. The rapid password cracking method as claimed in claim 2, wherein: the step S13 includes the following sub-steps:
s131: calling a corresponding feature extraction script according to the file type to extract features of the file, if the file is an encrypted file, obtaining an encrypted feature value after the feature value is successfully extracted, and entering the step S14; and if the file is the non-encrypted file, ending the whole working process.
5. The quick password cracking method as claimed in claim 4, wherein: and if the feature extraction fails, reporting an error and finishing the whole working process.
6. The rapid password cracking method as claimed in claim 1, wherein: and after the password is cracked successfully, judging a cracking mode, and if a non-dictionary cracking mode is adopted, writing the password obtained after the cracking is successful into a text dictionary.
7. A quick password cracking system is characterized in that: the system comprises a file type judgment module, an encryption characteristic value extraction module, an encryption characteristic value reading module, an encryption characteristic value and cracking result correspondence table, a password cracking module, a password cracking and warehousing module and a result query module; wherein the content of the first and second substances,
the file type judging module is used for judging the type of the decryption target file;
the encrypted characteristic value extraction module is used for extracting the encrypted characteristic value of the file;
the encryption characteristic value reading module is used for reading the encryption characteristic value of the file;
the encryption characteristic value and cracking result corresponding table is used for storing a password corresponding to the encryption characteristic value;
the password cracking and entering module is used for writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results;
the password cracking module is used for carrying out conventional password cracking on the encryption characteristic values which cannot find the corresponding password in the corresponding table of the encryption characteristic values and the cracking results;
and the result query module is used for returning the cracking result to the user.
8. The rapid password cracking system as claimed in claim 7, wherein: the system also comprises a text dictionary, and the password cracking and entering module is also used for writing the password obtained after the password is cracked successfully through the non-dictionary cracking mode into the text dictionary.
9. A computer program comprising computer program instructions, wherein the program instructions, when executed by a processor, are adapted to implement the method of rapid password cracking of any of claims 1-6.
10. A storage medium having computer program instructions stored thereon, wherein the program instructions, when executed by a processor, are for implementing the rapid password cracking method of any one of claims 1 to 6.
CN202110508880.3A 2021-05-11 2021-05-11 Method, system, computer program and storage medium for quickly cracking password Active CN113139200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110508880.3A CN113139200B (en) 2021-05-11 2021-05-11 Method, system, computer program and storage medium for quickly cracking password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110508880.3A CN113139200B (en) 2021-05-11 2021-05-11 Method, system, computer program and storage medium for quickly cracking password

Publications (2)

Publication Number Publication Date
CN113139200A true CN113139200A (en) 2021-07-20
CN113139200B CN113139200B (en) 2023-01-31

Family

ID=76817118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110508880.3A Active CN113139200B (en) 2021-05-11 2021-05-11 Method, system, computer program and storage medium for quickly cracking password

Country Status (1)

Country Link
CN (1) CN113139200B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116094733A (en) * 2023-04-03 2023-05-09 中国电子科技集团公司第三十研究所 Automatic cracking method and system for challenge/response identity authentication

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1396741A (en) * 2002-09-02 2003-02-12 郑建德 Public key cipher system based on classical matrix analysis
CN101064602A (en) * 2006-04-24 2007-10-31 北京易诚世纪科技有限公司 Cipher inputting method and system
CN102111418A (en) * 2011-03-02 2011-06-29 北京工业大学 Facial feature cryptographic key generation-based internet identity authentication method
CN102779251A (en) * 2012-06-29 2012-11-14 鸿富锦精密工业(深圳)有限公司 Electronic device and encrypting/decrypting method thereof
WO2013109330A2 (en) * 2011-10-31 2013-07-25 The Florida State University Research Foundation, Inc. System and methods for analyzing and modifying passwords
CN104077542A (en) * 2014-07-10 2014-10-01 南威软件股份有限公司 Password cracking system and method
CN104182208A (en) * 2014-08-08 2014-12-03 北京锐安科技有限公司 Method and system utilizing cracking rule to crack password
CN104217171A (en) * 2013-05-30 2014-12-17 安世盾信息技术(北京)有限公司 Password cracking method, device and system
US20150067760A1 (en) * 2013-08-28 2015-03-05 Lenovo (Singapore) Pte, Ltd. Conforming passwords to a password policy
CN104615945A (en) * 2015-02-04 2015-05-13 中国电子科技集团公司第三十研究所 Code cracking method and system based on multiple GPU cracking devices
CN105825122A (en) * 2015-01-05 2016-08-03 中国移动通信集团广西有限公司 Weak password verification and cracking method and device
WO2017054444A1 (en) * 2015-09-30 2017-04-06 深圳市先河系统技术有限公司 System login method, server, system, and network attached storage device
CN108377182A (en) * 2018-01-12 2018-08-07 电子科技大学 A kind of the RC4 stream ciphers generating means and method of high safety
CN108416208A (en) * 2018-02-05 2018-08-17 深圳大普微电子科技有限公司 A kind of method of decryption, host equipment and storage device
TWI656454B (en) * 2017-10-27 2019-04-11 國立成功大學 Method and system for preventing password file leakage detection
CN111835499A (en) * 2020-06-30 2020-10-27 中国电子科技集团公司第三十研究所 High-performance calculation-based L2TP/IPSEC (Internet protocol Security) cracking method and system
JP2020188321A (en) * 2019-05-10 2020-11-19 京セラドキュメントソリューションズ株式会社 Image processing system, image processing method, and image forming apparatus
CN112487147A (en) * 2020-12-02 2021-03-12 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN112507347A (en) * 2020-10-27 2021-03-16 中国科学院信息工程研究所 Cracking job description information generation method facing distributed password cracking framework
CN112580020A (en) * 2020-12-23 2021-03-30 北京安信荣达科技有限公司 IOS data extraction and password cracking device
CN113676348A (en) * 2021-08-04 2021-11-19 南京赋乐科技有限公司 Network channel cracking method, device, server and storage medium

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1396741A (en) * 2002-09-02 2003-02-12 郑建德 Public key cipher system based on classical matrix analysis
CN101064602A (en) * 2006-04-24 2007-10-31 北京易诚世纪科技有限公司 Cipher inputting method and system
CN102111418A (en) * 2011-03-02 2011-06-29 北京工业大学 Facial feature cryptographic key generation-based internet identity authentication method
WO2013109330A2 (en) * 2011-10-31 2013-07-25 The Florida State University Research Foundation, Inc. System and methods for analyzing and modifying passwords
CN102779251A (en) * 2012-06-29 2012-11-14 鸿富锦精密工业(深圳)有限公司 Electronic device and encrypting/decrypting method thereof
CN104217171A (en) * 2013-05-30 2014-12-17 安世盾信息技术(北京)有限公司 Password cracking method, device and system
US20150067760A1 (en) * 2013-08-28 2015-03-05 Lenovo (Singapore) Pte, Ltd. Conforming passwords to a password policy
CN104077542A (en) * 2014-07-10 2014-10-01 南威软件股份有限公司 Password cracking system and method
CN104182208A (en) * 2014-08-08 2014-12-03 北京锐安科技有限公司 Method and system utilizing cracking rule to crack password
CN105825122A (en) * 2015-01-05 2016-08-03 中国移动通信集团广西有限公司 Weak password verification and cracking method and device
CN104615945A (en) * 2015-02-04 2015-05-13 中国电子科技集团公司第三十研究所 Code cracking method and system based on multiple GPU cracking devices
WO2017054444A1 (en) * 2015-09-30 2017-04-06 深圳市先河系统技术有限公司 System login method, server, system, and network attached storage device
TWI656454B (en) * 2017-10-27 2019-04-11 國立成功大學 Method and system for preventing password file leakage detection
CN108377182A (en) * 2018-01-12 2018-08-07 电子科技大学 A kind of the RC4 stream ciphers generating means and method of high safety
CN108416208A (en) * 2018-02-05 2018-08-17 深圳大普微电子科技有限公司 A kind of method of decryption, host equipment and storage device
JP2020188321A (en) * 2019-05-10 2020-11-19 京セラドキュメントソリューションズ株式会社 Image processing system, image processing method, and image forming apparatus
CN111835499A (en) * 2020-06-30 2020-10-27 中国电子科技集团公司第三十研究所 High-performance calculation-based L2TP/IPSEC (Internet protocol Security) cracking method and system
CN112507347A (en) * 2020-10-27 2021-03-16 中国科学院信息工程研究所 Cracking job description information generation method facing distributed password cracking framework
CN112487147A (en) * 2020-12-02 2021-03-12 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN112580020A (en) * 2020-12-23 2021-03-30 北京安信荣达科技有限公司 IOS data extraction and password cracking device
CN113676348A (en) * 2021-08-04 2021-11-19 南京赋乐科技有限公司 Network channel cracking method, device, server and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
张小飞等: "不可逆加密算法和随机算法的分析与实现", 《信息网络安全》 *
李翔豪等: "SOHO路由器脆弱性的分析和验证", 《信息安全与通信保密》 *
王岁花等: "基于.NET的分布式系统用户密码加密方案设计", 《信阳师范学院学报(自然科学版)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116094733A (en) * 2023-04-03 2023-05-09 中国电子科技集团公司第三十研究所 Automatic cracking method and system for challenge/response identity authentication
CN116094733B (en) * 2023-04-03 2023-08-22 中国电子科技集团公司第三十研究所 Automatic cracking method and system for challenge/response identity authentication

Also Published As

Publication number Publication date
CN113139200B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
Sun et al. SigPID: significant permission identification for android malware detection
US8458186B2 (en) Systems and methods for processing and managing object-related data for use by a plurality of applications
US20170249345A1 (en) A biomolecule based data storage system
US20050210054A1 (en) Information management system
CN103942292A (en) Virtual machine mirror image document processing method, device and system
US9721114B2 (en) Automatic resource ownership assignment system and method
US9971809B1 (en) Systems and methods for searching unstructured documents for structured data
US11042507B2 (en) System and method of deletion of files and counteracting their restoration
CN113139200B (en) Method, system, computer program and storage medium for quickly cracking password
CN112559386A (en) Method and device for improving SSD performance, computer equipment and storage medium
US20090299935A1 (en) Method and apparatus for digital forensics
KR20220088958A (en) Systems and methods for managing connections in a scalable cluster
US10311021B1 (en) Systems and methods for indexing backup file metadata
CN111209608A (en) Big data storage system
CN107016296B (en) Data index construction method, data index reading method, data index construction device, data reading device and electronic equipment
CN116010926A (en) Login authentication method, login authentication device, computer equipment and storage medium
CN115618379A (en) HBase database-oriented multi-granularity data transparent encryption and decryption method and system
CN114461762A (en) Archive change identification method, device, equipment and storage medium
US9600508B1 (en) Data layer service availability
US12013943B2 (en) Data processing system and method capable of separating application processes
CN113591157B (en) Access encrypted database detection method, terminal device and storage medium
US20230344844A1 (en) Methods and systems for anomalous operation detection on an enterprise server
CN117311916B (en) Data processing method, system, device and storage medium for identity authentication
US20230342783A1 (en) Methods and systems for anomalous operation detection on a consumer device
US20090138523A1 (en) Content engine asynchronous upgrade framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant