Sie sind auf Seite 1von 6

NATIONAL AVIATION UNIVERSITY

Educational and Research Institute of Computer Information Technologies

Department of Computerized Control Systems

Laboratory work №1
on Information Protection in Computer Systems

Created by student
Of CS – 422 ERICIT
Azab Omar

Kyiv 2019
Laboratory work 1. Introduction to the subject
Purpose of work: to investigate the work of programs for data safety in
electronic form.
Tasks:
1. Learn to use programs for file and folder hiding, password hacking and
decrypting text out of images.
2. Analyze capabilities of these programs.
Order of work:
1. Order of work with file and folder hiders
a. According to the variant, install necessary software for file and folder hiding.
b. Create a folder and put a file into it.

c. By means of the installed program hide the given folder. Check its visibility
in MS Windows.
2. Order of work with password hacking programs
In this laboratory work we use the software Advanced ZIP Password
Recovery (AZPR) for hacking archives under password, shown on figure 1.1.
AZPR program is used for restoring forgotten password of ZIP-archives.
Today there are two ways to hack a password: brute force and dictionary-based
attack.
Order of work:
Brute force attack
1. Using a program to hack passwords, make an attack on an encrypted file.
The file must be given by teacher. The brute force area – all printable characters,
the length of the password is from 1 to 4 characters. Check the correctness of a
certain password by unpacking the file and reviewing its contents.
2. By completing step 1, reduce the brute force area to the actually used one
(for example, if the password is 6D1A, then select uppercase English letters and
numbers). Re-open. Compare elapsed time.

Conducting a dictionary attack (dictionary attack)


1. Compress the file obtained from the previous item by selecting the English
word up to 5 characters as a password (for example love, god, table, admin, etc.).
Conduct a dictionary attack. To do this, select the type of attack and select the
English.dic file in the Dictionary tab. It contains a set of English words and
character sets, most often used as passwords.
2. Try to determine the password by brute force. Compare elapsed time.

Order of work with the programs of the text extraction


a. Install the program Encrypt Text in Picture.
b. From the file received from the archive in the previous task, using the
installed program, extract the encrypted message.

Das könnte Ihnen auch gefallen