This study aims to evaluate and compare different password cracking tools that are available in the market like John the Ripper, Hashcat, WPScan, and Hydra to provide insights in their effectiveness in terms of average response time and success rate. The comparative analysis process involves testing and analyzing these tools based on performance, success rate, and different password attacking methods. The study also aims to conduct an empirical comparison of the password cracking tools based on the characteristics of features, ease of use, as well as community support and user guide. The results outline the success rate and performance analysis of both online and offline password attacks based on various password combinations. The study aims to contribute to cybersecurity by identifying the most effective tools and techniques for mitigating password attacks.
Florencio, D., Herley, C., & Van Oorschot, P. C. (2020). Passwords in the wild: Real-world patterns and how people use them. ACM Transactions on Computer-Human Interaction (TOCHI), 27(1), 1-39.
Guo, Y., Zhang, Z., & Guo, Y. (2019). Optiwords: A new password policy for creating memorable and strong passwords. Computers & Security, 85, 423-435.
Li, N., Wang, X., & Li, Y. (2021). Exploring the phenomenon of password reuse across online platforms. Journal of Cybersecurity, 7(1), 1-18.
Kumar, R., Kapoor, A., & Verma, R. (2022). Password reuse: A comprehensive study of user behavior across platforms. International Journal of Information Management, 62, 102071.
Papathanasaki, M., Maglaras, L., & Ayres, N. (2022). Modern Authentication Methods: A comprehensive survey. AI, Computer Science and Robotics Technology, 2022, 1–24. https://doi.org/10.5772/acrt.08
Shi, R., Zhou, Y., Li, Y., & Han, W. (2021). Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. Security and Communication Networks, 2021, 1–16. https://doi.org/10.1155/2021/5563884
Smith, A. N., Zhang, D., & Smith, J. M. (2019). Exploring password vulnerability to dictionary attacks and phishing. Cybersecurity, 2(1), 1-14.
Endut, N. A., Azam, N. A. A., & Zulkafli, A. S. A. (2024). A Comparative Analysis of Offline and Online Password Cracking Tools. International Journal of Academic Research in Business and Social Sciences, 14(9), 1894–1906.
Copyright: © 2024 The Author(s)
Published by Knowledge Words Publications (www.kwpublications.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode