2021
DOI: 10.1016/j.fsidi.2021.301186
|View full text |Cite
|
Sign up to set email alerts
|

How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Owing to the failure of many users in adhering to best practices of password usage, the method of password spraying attacks are often successful. As reported in 2019, recognizable number arrangements like "12345", typical names of females like Jennifer, and the word "password" are among the most commonly used passwords among users [59,60]. These, and other reported 200 easily guessed passwords have contributed to data breaches [59,60].…”
Section: Cyber Attacksmentioning
confidence: 94%
See 2 more Smart Citations
“…Owing to the failure of many users in adhering to best practices of password usage, the method of password spraying attacks are often successful. As reported in 2019, recognizable number arrangements like "12345", typical names of females like Jennifer, and the word "password" are among the most commonly used passwords among users [59,60]. These, and other reported 200 easily guessed passwords have contributed to data breaches [59,60].…”
Section: Cyber Attacksmentioning
confidence: 94%
“…As reported in 2019, recognizable number arrangements like "12345", typical names of females like Jennifer, and the word "password" are among the most commonly used passwords among users [59,60]. These, and other reported 200 easily guessed passwords have contributed to data breaches [59,60]. Hence, attackers targeting a reasonably large number of usernames and utilizing a sufficiently large array of common passwords are likely to succeed in gaining access to some accounts [40,43,44,59,60].…”
Section: Cyber Attacksmentioning
confidence: 98%
See 1 more Smart Citation
“…Password or key retrieval: Cloud forensic investigations encounter distinct challenges, especially in accessing encrypted data without cooperation from involved parties. Advanced tools, such as John the Ripper and Hashcat [ 127 ], provide critical support by enabling password retrieval. Additionally, analyzing memory dumps offers avenues for retrieving encryption keys, enhancing investigators’ capabilities to overcome challenges posed by encrypted data in cloud forensic examinations.…”
Section: Cloud Forensic Challengesmentioning
confidence: 99%
“…However, determining the probability distribution over such data sets is not a straightforward task and is outside the scope of this research. It is different from assessing word-list quality [34], [35], or individual password strength [36], [37], [38], [39], as both are a separate line of research. As Aggarwal et al shows [32], PCFG parse trees are usually ambiguous which means, there can be multiple ways to produce a single word.…”
Section: Related Literaturementioning
confidence: 99%