Evaluating the Effectiveness of Password Policies and Password Meters Using Hashcat

DSpace/Manakin Repository

Show simple item record

dc.contributor.advisor Focardi, Riccardo it_IT
dc.contributor.author Tubia, Marco <1998> it_IT
dc.date.accessioned 2024-02-18 it_IT
dc.date.accessioned 2024-05-08T13:22:23Z
dc.date.issued 2024-03-27 it_IT
dc.identifier.uri http://hdl.handle.net/10579/26485
dc.description.abstract When we authenticate on online web sites, passwords are the only thing that separates attackers from getting into our account. When we have to register on web sites, we are asked to generate a password, that we have to remember for future accesses. To prevent users to generate very weak passwords, sites provide some rules that must be respected. These rules are called password policies. These policies span from simple to complex: some require few “rules” to be respected, some much more. Recent studies have shown that users tend to use very simple to remember passwords and tend to reuse the same password over different sites. These simple passwords can be cracked with efficient tools, like Hashcat and John the Ripper, by using efficient techniques like dictionary attacks and rule attacks. In addition to policies, some sites provide the use of password meters, to visualize the strength of the new generated password. In this thesis we conducted a study on the effectiveness and security of the various password policies that we can find on the various websites when we have to register. To carry out this analysis, we started from a collection of 144,740,240 passwords, filtering the passwords in such a way as to satisfy various policies of interest to us. We started with very simple policies, and then increased their complexity, also adding external factors such as dictionaries of various languages and symbol substitutions. To understand the security of the various policies, we used the Hashcat tool and conducted an attack based on dictionary and rules. We have also studied the effectiveness of some password meters, to understand whether they can help create more effective passwords. For this study we cracked passwords depending on how they are classified by the various password meters. Our results showed that the more complex a policy is, the more secure it is. Furthermore, the use of effective password meters allows for the creation of more secure passwords. it_IT
dc.language.iso en it_IT
dc.publisher Università Ca' Foscari Venezia it_IT
dc.rights © Marco Tubia, 2024 it_IT
dc.title Evaluating the Effectiveness of Password Policies and Password Meters Using Hashcat it_IT
dc.title.alternative it_IT
dc.type Master's Degree Thesis it_IT
dc.degree.name Informatica - computer science it_IT
dc.degree.level Laurea magistrale it_IT
dc.degree.grantor Dipartimento di Scienze Ambientali, Informatica e Statistica it_IT
dc.description.academicyear 2022/2023 - sessione straordinaria it_IT
dc.rights.accessrights closedAccess it_IT
dc.thesis.matricno 867850 it_IT
dc.subject.miur INF/01 INFORMATICA it_IT
dc.description.note it_IT
dc.degree.discipline it_IT
dc.contributor.co-advisor it_IT
dc.date.embargoend 10000-01-01
dc.provenance.upload Marco Tubia (867850@stud.unive.it), 2024-02-18 it_IT
dc.provenance.plagiarycheck Riccardo Focardi (focardi@unive.it), 2024-03-04 it_IT


Files in this item

This item appears in the following Collection(s)

Show simple item record