Python gmail dictionary attack using wordlist
Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking accounts, website administrator pages, and others. Dictionary attack is considered effective because it utilizes human psychology, namely the...
Saved in:
| Published in | AIP conference proceedings Vol. 2714; no. 1 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article Conference Proceeding |
| Language | English |
| Published |
Melville
American Institute of Physics
09.05.2023
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0094-243X 1551-7616 |
| DOI | 10.1063/5.0128464 |
Cover
| Abstract | Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking accounts, website administrator pages, and others. Dictionary attack is considered effective because it utilizes human psychology, namely the habit that account users will use easy-to-remember words as passwords for a particular account. In addition, dictionary attacks have also been developed for variations as well as effectiveness, so that until now this technique is still often used to break user passwords for an account. In the context of cryptanalysis and computer security, dictionary attack is a technique against ciphers or against authentication mechanisms by determining the decryption key by looking for possible combinations of words contained in a dictionary. Dictionary attack is also a development of brute force attack, which is trying to crack the code by trying one by one possibility repeatedly (exhaustive search). A dictionary attack is not trying to combine the available characters one by one like brute force, but rather trying the most successful word combination by inputting a defined "list of words" (also known as a dictionary), which usually comes from a list of common word combinations. contained in a dictionary, such as an English dictionary. In this study using the ptyhon programming language for scripting, utilizing smtp.gmail.com with port 465 and with 1,406,537 wordlist passwords, then testing using the Backbox Linux platform, getting 100% accurate results for gmail passwords. |
|---|---|
| AbstractList | Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking accounts, website administrator pages, and others. Dictionary attack is considered effective because it utilizes human psychology, namely the habit that account users will use easy-to-remember words as passwords for a particular account. In addition, dictionary attacks have also been developed for variations as well as effectiveness, so that until now this technique is still often used to break user passwords for an account. In the context of cryptanalysis and computer security, dictionary attack is a technique against ciphers or against authentication mechanisms by determining the decryption key by looking for possible combinations of words contained in a dictionary. Dictionary attack is also a development of brute force attack, which is trying to crack the code by trying one by one possibility repeatedly (exhaustive search). A dictionary attack is not trying to combine the available characters one by one like brute force, but rather trying the most successful word combination by inputting a defined "list of words" (also known as a dictionary), which usually comes from a list of common word combinations. contained in a dictionary, such as an English dictionary. In this study using the ptyhon programming language for scripting, utilizing smtp.gmail.com with port 465 and with 1,406,537 wordlist passwords, then testing using the Backbox Linux platform, getting 100% accurate results for gmail passwords. |
| Author | Pratama, Eri Bayu Nurmalasari Maulana, Muhammad Sony Firmansyah, Yoki Widianto, Septian Rheno |
| Author_xml | – sequence: 1 givenname: Septian Rheno surname: Widianto fullname: Widianto, Septian Rheno email: septian.sei@bsi.ac.id organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia – sequence: 2 givenname: Muhammad Sony surname: Maulana fullname: Maulana, Muhammad Sony organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia – sequence: 3 givenname: Eri Bayu surname: Pratama fullname: Pratama, Eri Bayu email: eri.ebp@bsi.ac.id organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia – sequence: 4 givenname: Yoki surname: Firmansyah fullname: Firmansyah, Yoki email: yoki.yry@bsi.ac.id organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia – sequence: 5 surname: Nurmalasari fullname: Nurmalasari email: nurmalasari.nrr@bsi.ac.id organization: Information System, Universitas Bina Sarana Informatika, Jakarta, Indonesia |
| BookMark | eNp9kE1LAzEURYNUsK0u_AcD7oSpeZPJS2YpRatQ0IWCuxDzUVPbyThJlf57W1pw5-puDvce7ogM2tg6Qi6BToAiu-ETCpWssT4hQ-AcSoGAAzKktKnLqmZvZ2SU0pLSqhFCDkn5vM0fsS0Wax1WhQ0mh9jqflvonLX5LDYptIviJ_Z2FVI-J6der5K7OOaYvN7fvUwfyvnT7HF6Oy87QJlLr7UAtCgleIvWS2ENOqGl0YCeV9ozlMIh1hXnDWXy3Rpae66ZE1w6w8bk6tDb9fFr41JWy7jp292kqiQAg6ahsKOuD1QyIeu9uOr6sN7ZK6Bqf4fi6njHf_B37P9A1VnPfgGximGv |
| CODEN | APCPCS |
| ContentType | Journal Article Conference Proceeding |
| Copyright | Author(s) 2023 Author(s). Published by AIP Publishing. |
| Copyright_xml | – notice: Author(s) – notice: 2023 Author(s). Published by AIP Publishing. |
| DBID | 8FD H8D L7M |
| DOI | 10.1063/5.0128464 |
| DatabaseName | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
| DatabaseTitle | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Physics |
| EISSN | 1551-7616 |
| Editor | Hastuti, Dwi Puji Baidawi, Taufik Haryani Agustiani, Sarifah Dalis, Sopiyan Junaidi, Agus Arifin, Yoseph Tajul |
| Editor_xml | – sequence: 1 givenname: Agus surname: Junaidi fullname: Junaidi, Agus organization: Bina Sarana Informatika University – sequence: 2 surname: Haryani fullname: Haryani organization: Bina Sarana Informatika University – sequence: 3 givenname: Taufik surname: Baidawi fullname: Baidawi, Taufik organization: Bina Sarana Informatika University – sequence: 4 givenname: Sarifah surname: Agustiani fullname: Agustiani, Sarifah organization: Bina Sarana Informatika University – sequence: 5 givenname: Dwi Puji surname: Hastuti fullname: Hastuti, Dwi Puji organization: Bina Sarana Informatika University – sequence: 6 givenname: Sopiyan surname: Dalis fullname: Dalis, Sopiyan organization: Bina Sarana Informatika University – sequence: 7 givenname: Yoseph Tajul surname: Arifin fullname: Arifin, Yoseph Tajul organization: Bina Sarana Informatika University |
| ExternalDocumentID | acp |
| Genre | Conference Proceeding |
| GroupedDBID | -~X 23M 5GY AAAAW AABDS AAEUA AAPUP AAYIH ABJNI ACBRY ACZLF ADCTM AEJMO AFATG AFHCQ AGKCL AGLKD AGMXG AGTJO AHSDT AJJCW ALEPV ALMA_UNASSIGNED_HOLDINGS ATXIE AWQPM BPZLN F5P FDOHQ FFFMQ HAM M71 M73 RIP RQS SJN ~02 8FD ABJGX ADMLS H8D L7M |
| ID | FETCH-LOGICAL-p168t-faa716d6881fd6df87dc6e7a8ca16f52af3687e6642559038bdc04f5a3e758ec3 |
| ISSN | 0094-243X |
| IngestDate | Mon Jun 30 03:09:16 EDT 2025 Fri Jun 21 00:12:46 EDT 2024 Tue Jul 04 19:18:13 EDT 2023 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | 0094-243X/2023/2714/030033/10/$30.00 Published by AIP Publishing. |
| LinkModel | OpenURL |
| MeetingName | 2ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION SCIENTIFIC DEVELOPMENT (ICAISD) 2021: Innovating Scientific Learning for Deep Communication |
| MergedId | FETCHMERGED-LOGICAL-p168t-faa716d6881fd6df87dc6e7a8ca16f52af3687e6642559038bdc04f5a3e758ec3 |
| Notes | ObjectType-Conference Proceeding-1 SourceType-Conference Papers & Proceedings-1 content type line 21 |
| PQID | 2811319901 |
| PQPubID | 2050672 |
| PageCount | 10 |
| ParticipantIDs | proquest_journals_2811319901 scitation_primary_10_1063_5_0128464 |
| PublicationCentury | 2000 |
| PublicationDate | 20230509 |
| PublicationDateYYYYMMDD | 2023-05-09 |
| PublicationDate_xml | – month: 05 year: 2023 text: 20230509 day: 09 |
| PublicationDecade | 2020 |
| PublicationPlace | Melville |
| PublicationPlace_xml | – name: Melville |
| PublicationTitle | AIP conference proceedings |
| PublicationYear | 2023 |
| Publisher | American Institute of Physics |
| Publisher_xml | – name: American Institute of Physics |
| References | Stallings (c5) 1998; 1 Almomani, Gupta, Atawneh, Meulenberg, Almomani (c10) 2013; 15 Hurtado, Sarango (c22) 2017; 8 Fang, Zhang, Huang, Liu, Yang (c8) 2019; 7 Rheno Widianto, Abdullah Azzam (c2) 2018; 3 Wong, Tian (c15) 2012; 7 Fang (c14) 2020; 10 Utoro, Nugroho, Meinawati, Widianto (c19) 2020; 6 Febrianto, Apriani (c6) 2017; 13 Abdulhamid, Shuaib, Osho, Ismaila, Alhassan (c11) 2018; 10 Tohirin, Mauludyansah, Setyawan, Widianto (c20); 5 |
| References_xml | – volume: 5 start-page: 52 ident: c20 article-title: Analisis Kualitas dan Penerapan Software Quality Assurance Pada Situs Web e-Clinic Menggunakan Model ISO/IEC 9126 publication-title: MULTINETICS – volume: 10 start-page: 60 year: 2018 ident: c11 article-title: Comparative Analysis of Classification Algorithms for Email Spam Detection publication-title: International Journal of Computer Network and Information Security – volume: 3 start-page: 19 year: 2018 ident: c2 article-title: Analisis Upaya Peretasan Web Application Firewall dan Notifikasi Serangan Menggunakan Bot Telegram pada Layanan Web Server publication-title: Elektra – volume: 1 start-page: 5 year: 1998 ident: c5 article-title: SSL : Foundation For Web Security publication-title: The Internet Protocol Journal – volume: 13 year: 2017 ident: c6 article-title: Perbandingan Sistem Pengamanan Email Menggunakan Teknik Public Key Encryption dan Pretty Good Privacy (PGP publication-title: Jurnal Cendikia – volume: 10 start-page: 4425 year: 2020 ident: c14 article-title: Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads publication-title: Applied Sciences – volume: 6 start-page: 169 year: 2020 ident: c19 article-title: Analisis Keamanan Website E-Learning SMKN 1 Cibatu Menggunakan Metode Penetration Testing Execution Standard publication-title: MULTINETICS – volume: 8 start-page: 273 year: 2017 ident: c22 article-title: Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers publication-title: Enfoqute – volume: 7 start-page: 56329 year: 2019 ident: c8 article-title: Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism publication-title: IEEE Access – volume: 15 start-page: 2070 year: 2013 ident: c10 article-title: A Survey of Phishing Email Filtering Techniques publication-title: IEEE Communications Surveys & Tutorials – volume: 7 start-page: 1 year: 2012 ident: c15 article-title: E-mail protocols with perfect forward secrecy publication-title: Int. J. Secur. Networks |
| SSID | ssj0029778 |
| Score | 2.3292608 |
| Snippet | Dictionary attack is a very effective attack to crack the code and is often used by hackers to break into passwords, such as email accounts, social networking... |
| SourceID | proquest scitation |
| SourceType | Aggregation Database Enrichment Source Publisher |
| SubjectTerms | Algorithms Cryptography Cybersecurity Dictionaries Electronic mail Encryption Passwords Programming languages Python Websites Words (language) |
| Title | Python gmail dictionary attack using wordlist |
| URI | http://dx.doi.org/10.1063/5.0128464 https://www.proquest.com/docview/2811319901 |
| Volume | 2714 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1551-7616 dateEnd: 20241101 omitProxy: false ssIdentifier: ssj0029778 issn: 0094-243X databaseCode: ADMLS dateStart: 20000101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLagE4I3LkMMBooE4qUyLHbiuI8DVg3Ujkprpb5FJ07MJtasrAmo_HqOL0larUKCl6iKrKb1d3J8vnMl5I0aCNOGKqcZMyU5IokoyELQKETxwjeEAdgs3zNxOou-zON5F9G11SVV9k793llX8j-o4j3E1VTJ_gOy7ZfiDfyM-OIVEcbrbYx3HjXHnycmcbxpFtutWW3KwmRtOgT0vy3g0oRkbCmDyZaDqgL1vV9bf8EvpKFXvhrIhmAuCjuWGxWHkSG0Uc9NBkwnTWOor6CE_ri-gMUCTAZo2TroJyhZsACvavsfYF13CsaNyh5emoKF1dp7pL3rgblEv07BtTGlrbwGm7mqNj2NyCApi-zYXzxyvJ6NQ5oIV2bZKGKWuHrSTZG7peHRpEJYTK9VPFhdA_TtLtpnX9PhbDRKpyfz6dvlD2oGjJlAvJ-2cpfsMY5y2CN7x5_Go_OWnaMh7I5t_2ubNlSCv2-ftkVD7qON4tIlNiyS6UOy39VqBpMW9kfkTlE-Jvf89jwh1GEfWOyDDvvAYR9Y7IMG-30yG55MP55SPyKDLkMhK6oBkPDmQspQ5yLXMsmVKBKQCkKhYwaaC5kUAlkmUscjLrNcHUU6Bl4gUSwUf0p65XVZPCOBRlOY64GQTCNF5krGMUe2mSHHHTCpowNy2Pz31L8Dq5TJMEQljkblAXnd7ke6dJ1SUpvhIHgap34Dd676eX3TrUiXuX7-90e9IA86aTwkveqmLl6iaVhlrzyofwDZ_mgp |
| linkProvider | EBSCOhost |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=Python+gmail+dictionary+attack+using+wordlist&rft.au=Rheno%2C+Widianto+Septian&rft.au=Maulana+Muhammad+Sony&rft.au=Pratama%2C+Eri+Bayu&rft.au=Yoki%2C+Firmansyah&rft.date=2023-05-09&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2714&rft.issue=1&rft_id=info:doi/10.1063%2F5.0128464&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon |