0% found this document useful (0 votes)
231 views

Password Attacks: Software Specification and Hardware Specification

The document discusses password attacks and provides details of software and hardware specifications for different types of attacks. It lists team members and then shows a table with 4 types of attacks - dictionary attack, brute force attack, keylogger attack, and Trojan malware. For each attack it specifies the software used like Python tools Termux, Medusa, Metasploit, and hardware like Kali Linux, Windows. It also provides brief descriptions of Termux, Medusa and Metasploit keylogger.

Uploaded by

Likhithap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
231 views

Password Attacks: Software Specification and Hardware Specification

The document discusses password attacks and provides details of software and hardware specifications for different types of attacks. It lists team members and then shows a table with 4 types of attacks - dictionary attack, brute force attack, keylogger attack, and Trojan malware. For each attack it specifies the software used like Python tools Termux, Medusa, Metasploit, and hardware like Kali Linux, Windows. It also provides brief descriptions of Termux, Medusa and Metasploit keylogger.

Uploaded by

Likhithap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Password Attacks

Team Members:

 Likhitha Pallerla
 Chaitanya Tammineni
 G. Charith Reddy
 Dwijesh Vemuri

-------------------------------------------------------------------------------------------------------------------------------

Software Specification and Hardware Specification:


S.No Attack/Malware Software Specification Hardware Specification
1 Dictionary Attack Python/ Termux tool* Kali Linux/Windows 9,10

2 Brute Force Attack Python/ Medusa tool# Kali Linux/Windows 9,10

3 Keylogger Attack (Software Python/ Metasploit$ Kali Linux/Windows 9,10


Technique: Using Trojan)
4 Trojan Malware Python/ Metasploit Kali Linux/Windows 9,10
(MSF venom)

* Termux allows you to install many useful hacking tools on your Android


phone. These awesome hacking tools include Wireshark, Nmap, Metasploit
framework, Sqlmap, etc.
#
Medusa is a speedy, massively parallel, modular, login brute-force for
network.
$
Metasploit's Meterpreter has a built-in software keylogger called
keyscan.

You might also like