Beruflich Dokumente
Kultur Dokumente
Laboratory work №1
on Information Protection in Computer Systems
Created by student
Of CS – 422 ERICIT
Azab Omar
Kyiv 2019
Laboratory work 1. Introduction to the subject
Purpose of work: to investigate the work of programs for data safety in
electronic form.
Tasks:
1. Learn to use programs for file and folder hiding, password hacking and
decrypting text out of images.
2. Analyze capabilities of these programs.
Order of work:
1. Order of work with file and folder hiders
a. According to the variant, install necessary software for file and folder hiding.
b. Create a folder and put a file into it.
c. By means of the installed program hide the given folder. Check its visibility
in MS Windows.
2. Order of work with password hacking programs
In this laboratory work we use the software Advanced ZIP Password
Recovery (AZPR) for hacking archives under password, shown on figure 1.1.
AZPR program is used for restoring forgotten password of ZIP-archives.
Today there are two ways to hack a password: brute force and dictionary-based
attack.
Order of work:
Brute force attack
1. Using a program to hack passwords, make an attack on an encrypted file.
The file must be given by teacher. The brute force area – all printable characters,
the length of the password is from 1 to 4 characters. Check the correctness of a
certain password by unpacking the file and reviewing its contents.
2. By completing step 1, reduce the brute force area to the actually used one
(for example, if the password is 6D1A, then select uppercase English letters and
numbers). Re-open. Compare elapsed time.