Automatic Penetration Testing and Security Services. Beenu Arora 0361483104 www.BeenuArora.com. Presentation Overview. Introduction Cyber Attacks : 1 case study Need for such tool Information about Project. INTRODUCTION.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Automatic Penetration Testing
Since the password can be easily cracked , then what’s the point of keeping
It . The next slide explain this. So there was a need to make a strong algorithm
From some existing one.
Note: The key was cracked using IDA Pro. application
Note: A glimpse of APT v1.0
Implement an encryption system developed from existing system.
Traditional Process in various web applications
Plaintext ================================= MD5 Hash
(User Enters Password) MD5 Algorithm (128 bit hash)
Enhanced Encryption System
(User enter Password)
(H1) (H2) (H3) (H4) (H-N)
MD5 MD5 MD5 MD5 n-times where n is
length of password
Hence n becomes the private key of the user and at the database H-N is stored
(CEH, MCSE, Darkcoder)