Python gmail dictionary attack using wordlist

Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking accounts, website administrator pages, and others. Dictionary attack is considered effective because it utilizes human psychology, namely the...

Full description

Saved in:
Bibliographic Details
Published inAIP conference proceedings Vol. 2714; no. 1
Main Authors Widianto, Septian Rheno, Maulana, Muhammad Sony, Pratama, Eri Bayu, Firmansyah, Yoki, Nurmalasari
Format Journal Article Conference Proceeding
LanguageEnglish
Published Melville American Institute of Physics 09.05.2023
Subjects
Online AccessGet full text
ISSN0094-243X
1551-7616
DOI10.1063/5.0128464

Cover

Abstract Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking accounts, website administrator pages, and others. Dictionary attack is considered effective because it utilizes human psychology, namely the habit that account users will use easy-to-remember words as passwords for a particular account. In addition, dictionary attacks have also been developed for variations as well as effectiveness, so that until now this technique is still often used to break user passwords for an account. In the context of cryptanalysis and computer security, dictionary attack is a technique against ciphers or against authentication mechanisms by determining the decryption key by looking for possible combinations of words contained in a dictionary. Dictionary attack is also a development of brute force attack, which is trying to crack the code by trying one by one possibility repeatedly (exhaustive search). A dictionary attack is not trying to combine the available characters one by one like brute force, but rather trying the most successful word combination by inputting a defined "list of words" (also known as a dictionary), which usually comes from a list of common word combinations. contained in a dictionary, such as an English dictionary. In this study using the ptyhon programming language for scripting, utilizing smtp.gmail.com with port 465 and with 1,406,537 wordlist passwords, then testing using the Backbox Linux platform, getting 100% accurate results for gmail passwords.
AbstractList Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking accounts, website administrator pages, and others. Dictionary attack is considered effective because it utilizes human psychology, namely the habit that account users will use easy-to-remember words as passwords for a particular account. In addition, dictionary attacks have also been developed for variations as well as effectiveness, so that until now this technique is still often used to break user passwords for an account. In the context of cryptanalysis and computer security, dictionary attack is a technique against ciphers or against authentication mechanisms by determining the decryption key by looking for possible combinations of words contained in a dictionary. Dictionary attack is also a development of brute force attack, which is trying to crack the code by trying one by one possibility repeatedly (exhaustive search). A dictionary attack is not trying to combine the available characters one by one like brute force, but rather trying the most successful word combination by inputting a defined "list of words" (also known as a dictionary), which usually comes from a list of common word combinations. contained in a dictionary, such as an English dictionary. In this study using the ptyhon programming language for scripting, utilizing smtp.gmail.com with port 465 and with 1,406,537 wordlist passwords, then testing using the Backbox Linux platform, getting 100% accurate results for gmail passwords.
Author Pratama, Eri Bayu
Nurmalasari
Maulana, Muhammad Sony
Firmansyah, Yoki
Widianto, Septian Rheno
Author_xml – sequence: 1
  givenname: Septian Rheno
  surname: Widianto
  fullname: Widianto, Septian Rheno
  email: septian.sei@bsi.ac.id
  organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia
– sequence: 2
  givenname: Muhammad Sony
  surname: Maulana
  fullname: Maulana, Muhammad Sony
  organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia
– sequence: 3
  givenname: Eri Bayu
  surname: Pratama
  fullname: Pratama, Eri Bayu
  email: eri.ebp@bsi.ac.id
  organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia
– sequence: 4
  givenname: Yoki
  surname: Firmansyah
  fullname: Firmansyah, Yoki
  email: yoki.yry@bsi.ac.id
  organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia
– sequence: 5
  surname: Nurmalasari
  fullname: Nurmalasari
  email: nurmalasari.nrr@bsi.ac.id
  organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia
BookMark eNp9kE1LAzEURYNUsK0u_AcD7oSpeZPJS2YpRatQ0IWCuxDzUVPbyThJlf57W1pw5-puDvce7ogM2tg6Qi6BToAiu-ETCpWssT4hQ-AcSoGAAzKktKnLqmZvZ2SU0pLSqhFCDkn5vM0fsS0Wax1WhQ0mh9jqflvonLX5LDYptIviJ_Z2FVI-J6der5K7OOaYvN7fvUwfyvnT7HF6Oy87QJlLr7UAtCgleIvWS2ENOqGl0YCeV9ozlMIh1hXnDWXy3Rpae66ZE1w6w8bk6tDb9fFr41JWy7jp292kqiQAg6ahsKOuD1QyIeu9uOr6sN7ZK6Bqf4fi6njHf_B37P9A1VnPfgGximGv
CODEN APCPCS
ContentType Journal Article
Conference Proceeding
Copyright Author(s)
2023 Author(s). Published by AIP Publishing.
Copyright_xml – notice: Author(s)
– notice: 2023 Author(s). Published by AIP Publishing.
DBID 8FD
H8D
L7M
DOI 10.1063/5.0128464
DatabaseName Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitle Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitleList
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1551-7616
Editor Hastuti, Dwi Puji
Baidawi, Taufik
Haryani
Agustiani, Sarifah
Dalis, Sopiyan
Junaidi, Agus
Arifin, Yoseph Tajul
Editor_xml – sequence: 1
  givenname: Agus
  surname: Junaidi
  fullname: Junaidi, Agus
  organization: Bina Sarana Informatika University
– sequence: 2
  surname: Haryani
  fullname: Haryani
  organization: Bina Sarana Informatika University
– sequence: 3
  givenname: Taufik
  surname: Baidawi
  fullname: Baidawi, Taufik
  organization: Bina Sarana Informatika University
– sequence: 4
  givenname: Sarifah
  surname: Agustiani
  fullname: Agustiani, Sarifah
  organization: Bina Sarana Informatika University
– sequence: 5
  givenname: Dwi Puji
  surname: Hastuti
  fullname: Hastuti, Dwi Puji
  organization: Bina Sarana Informatika University
– sequence: 6
  givenname: Sopiyan
  surname: Dalis
  fullname: Dalis, Sopiyan
  organization: Bina Sarana Informatika University
– sequence: 7
  givenname: Yoseph Tajul
  surname: Arifin
  fullname: Arifin, Yoseph Tajul
  organization: Bina Sarana Informatika University
ExternalDocumentID acp
Genre Conference Proceeding
GroupedDBID -~X
23M
5GY
AAAAW
AABDS
AAEUA
AAPUP
AAYIH
ABJNI
ACBRY
ACZLF
ADCTM
AEJMO
AFATG
AFHCQ
AGKCL
AGLKD
AGMXG
AGTJO
AHSDT
AJJCW
ALEPV
ALMA_UNASSIGNED_HOLDINGS
ATXIE
AWQPM
BPZLN
F5P
FDOHQ
FFFMQ
HAM
M71
M73
RIP
RQS
SJN
~02
8FD
ABJGX
ADMLS
H8D
L7M
ID FETCH-LOGICAL-p168t-faa716d6881fd6df87dc6e7a8ca16f52af3687e6642559038bdc04f5a3e758ec3
ISSN 0094-243X
IngestDate Mon Jun 30 03:09:16 EDT 2025
Fri Jun 21 00:12:46 EDT 2024
Tue Jul 04 19:18:13 EDT 2023
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License 0094-243X/2023/2714/030033/10/$30.00
Published by AIP Publishing.
LinkModel OpenURL
MeetingName 2ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION SCIENTIFIC DEVELOPMENT (ICAISD) 2021: Innovating Scientific Learning for Deep Communication
MergedId FETCHMERGED-LOGICAL-p168t-faa716d6881fd6df87dc6e7a8ca16f52af3687e6642559038bdc04f5a3e758ec3
Notes ObjectType-Conference Proceeding-1
SourceType-Conference Papers & Proceedings-1
content type line 21
PQID 2811319901
PQPubID 2050672
PageCount 10
ParticipantIDs proquest_journals_2811319901
scitation_primary_10_1063_5_0128464
PublicationCentury 2000
PublicationDate 20230509
PublicationDateYYYYMMDD 2023-05-09
PublicationDate_xml – month: 05
  year: 2023
  text: 20230509
  day: 09
PublicationDecade 2020
PublicationPlace Melville
PublicationPlace_xml – name: Melville
PublicationTitle AIP conference proceedings
PublicationYear 2023
Publisher American Institute of Physics
Publisher_xml – name: American Institute of Physics
References Stallings (c5) 1998; 1
Almomani, Gupta, Atawneh, Meulenberg, Almomani (c10) 2013; 15
Hurtado, Sarango (c22) 2017; 8
Fang, Zhang, Huang, Liu, Yang (c8) 2019; 7
Rheno Widianto, Abdullah Azzam (c2) 2018; 3
Wong, Tian (c15) 2012; 7
Fang (c14) 2020; 10
Utoro, Nugroho, Meinawati, Widianto (c19) 2020; 6
Febrianto, Apriani (c6) 2017; 13
Abdulhamid, Shuaib, Osho, Ismaila, Alhassan (c11) 2018; 10
Tohirin, Mauludyansah, Setyawan, Widianto (c20); 5
References_xml – volume: 5
  start-page: 52
  ident: c20
  article-title: Analisis Kualitas dan Penerapan Software Quality Assurance Pada Situs Web e-Clinic Menggunakan Model ISO/IEC 9126
  publication-title: MULTINETICS
– volume: 10
  start-page: 60
  year: 2018
  ident: c11
  article-title: Comparative Analysis of Classification Algorithms for Email Spam Detection
  publication-title: International Journal of Computer Network and Information Security
– volume: 3
  start-page: 19
  year: 2018
  ident: c2
  article-title: Analisis Upaya Peretasan Web Application Firewall dan Notifikasi Serangan Menggunakan Bot Telegram pada Layanan Web Server
  publication-title: Elektra
– volume: 1
  start-page: 5
  year: 1998
  ident: c5
  article-title: SSL : Foundation For Web Security
  publication-title: The Internet Protocol Journal
– volume: 13
  year: 2017
  ident: c6
  article-title: Perbandingan Sistem Pengamanan Email Menggunakan Teknik Public Key Encryption dan Pretty Good Privacy (PGP
  publication-title: Jurnal Cendikia
– volume: 10
  start-page: 4425
  year: 2020
  ident: c14
  article-title: Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads
  publication-title: Applied Sciences
– volume: 6
  start-page: 169
  year: 2020
  ident: c19
  article-title: Analisis Keamanan Website E-Learning SMKN 1 Cibatu Menggunakan Metode Penetration Testing Execution Standard
  publication-title: MULTINETICS
– volume: 8
  start-page: 273
  year: 2017
  ident: c22
  article-title: Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers
  publication-title: Enfoqute
– volume: 7
  start-page: 56329
  year: 2019
  ident: c8
  article-title: Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
  publication-title: IEEE Access
– volume: 15
  start-page: 2070
  year: 2013
  ident: c10
  article-title: A Survey of Phishing Email Filtering Techniques
  publication-title: IEEE Communications Surveys & Tutorials
– volume: 7
  start-page: 1
  year: 2012
  ident: c15
  article-title: E-mail protocols with perfect forward secrecy
  publication-title: Int. J. Secur. Networks
SSID ssj0029778
Score 2.3292608
Snippet Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking...
SourceID proquest
scitation
SourceType Aggregation Database
Enrichment Source
Publisher
SubjectTerms Algorithms
Cryptography
Cybersecurity
Dictionaries
Electronic mail
Encryption
Passwords
Programming languages
Python
Websites
Words (language)
Title Python gmail dictionary attack using wordlist
URI http://dx.doi.org/10.1063/5.0128464
https://www.proquest.com/docview/2811319901
Volume 2714
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1551-7616
  dateEnd: 20241101
  omitProxy: false
  ssIdentifier: ssj0029778
  issn: 0094-243X
  databaseCode: ADMLS
  dateStart: 20000101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLagE4I3LkMMBooE4qUyLHbiuI8DVg3Ujkprpb5FJ07MJtasrAmo_HqOL0larUKCl6iKrKb1d3J8vnMl5I0aCNOGKqcZMyU5IokoyELQKETxwjeEAdgs3zNxOou-zON5F9G11SVV9k793llX8j-o4j3E1VTJ_gOy7ZfiDfyM-OIVEcbrbYx3HjXHnycmcbxpFtutWW3KwmRtOgT0vy3g0oRkbCmDyZaDqgL1vV9bf8EvpKFXvhrIhmAuCjuWGxWHkSG0Uc9NBkwnTWOor6CE_ri-gMUCTAZo2TroJyhZsACvavsfYF13CsaNyh5emoKF1dp7pL3rgblEv07BtTGlrbwGm7mqNj2NyCApi-zYXzxyvJ6NQ5oIV2bZKGKWuHrSTZG7peHRpEJYTK9VPFhdA_TtLtpnX9PhbDRKpyfz6dvlD2oGjJlAvJ-2cpfsMY5y2CN7x5_Go_OWnaMh7I5t_2ubNlSCv2-ftkVD7qON4tIlNiyS6UOy39VqBpMW9kfkTlE-Jvf89jwh1GEfWOyDDvvAYR9Y7IMG-30yG55MP55SPyKDLkMhK6oBkPDmQspQ5yLXMsmVKBKQCkKhYwaaC5kUAlkmUscjLrNcHUU6Bl4gUSwUf0p65XVZPCOBRlOY64GQTCNF5krGMUe2mSHHHTCpowNy2Pz31L8Dq5TJMEQljkblAXnd7ke6dJ1SUpvhIHgap34Dd676eX3TrUiXuX7-90e9IA86aTwkveqmLl6iaVhlrzyofwDZ_mgp
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=Python+gmail+dictionary+attack+using+wordlist&rft.au=Rheno%2C+Widianto+Septian&rft.au=Maulana+Muhammad+Sony&rft.au=Pratama%2C+Eri+Bayu&rft.au=Yoki%2C+Firmansyah&rft.date=2023-05-09&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2714&rft.issue=1&rft_id=info:doi/10.1063%2F5.0128464&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon