groupreport4 (1)(1)
groupreport4 (1)(1)
ON
TESTING PASSWORD STRENGTH
Submitted by
CHATTA MOUNIKA 21781A3225
KADAPA REENA ANJUM 21781A3247
KANUMURU HINDUJA 21781A3253
KOMMINENI DHARMA TEJA 21781A3256
KONANGI VISHNU VARDHAN 21781A3257
Mr. M. NAVALAN
Associate Professor
BONAFIDE CERTIFICATE
This is to certify that, the project report entitled “TESTING PASSWORD STRENGTH” is the
bonafide work carried out by
Students of B.TECH., CSE (DATA SCIENCE), SVCET (AUTONOMOUS), during the academic
year 2024-2025, in partial fulfillment of the requirements for the award of the Degree of Bachelor
of Technology in COMPUTER SCIENCE AND ENGINEERING (DATA SCIENCE).
SIGNATURE SIGNATURE
CERTIFICATE OF EVALUATION
DECLARATION
We hereby declare that the Project Report entitled “TESTING PASSWORD STRENGTH” under the
guidance Of Mr. M NAVALAN, Associate Professor, Sri Venkateswara College of Engineering &
Technology (Autonomous), Chittoor is submitted in partial fulfillment of the requirements for the award
of the degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING
(DATA SCIENCE).
TABLE OF CONTENT:
1. INTRODUCTION 2
2. PROBLEM STATEMENT 4
3. LITERATURE REVIEW 5
4. DATA COLLECTION 6
5. SYSTEM STUDY 7-14
5.1. EXISTING SYSTEM
5.2. DISADVANTAGES
5.3. PROPOSED SYSTEMS
5.4. ARCHITECTURAL DIAGRAM
6. METHODOLOGY 15-18
6.1. ENHANCEMENTS
7. IMPLEMENTAIONS 19
8. SYSTEM SPECIFICATIONS 20-35
8.1. HARDWARE REQUIERMENTS
8.2. EXECUTION FOR FRONT-END
8.3. EXECUTION FOR BACK-END
9. CODING 36-37
10. EXECUTION SCFEENSHONS 38
11. FUTURE SCOPE 39
12. APPLICATION 40
13. SYSTEM TESTING 41
14. CONCLUSIONS 41
15. REFERENCES 42
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 1
[TESTING PASSWORD STRENGTH]
1.INTRODUCTION
In today's digital age, password security is a critical concern for individuals and
organizations alike. With the increasing number of online threats and
cyberattacks, it's essential to ensure that passwords are strong and resistant to
unauthorized access. Passwords are the first line of defence against cyber threats,
and weak passwords can compromise the security of sensitive information.
Testing password strength is a crucial step in evaluating the security of passwords
and identifying potential vulnerabilities. This process involves assessing the
password's resistance to various types of attacks, including brute-force,
dictionary, and rainbow table attacks. By testing password strength, individuals
and organizations can identify weak passwords and take steps to strengthen them,
reducing the risk of security breaches and protecting sensitive information.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 2
[TESTING PASSWORD STRENGTH]
2. PROBLEM STATEMENT
The lack of effective password strength testing methods can allow vulnerable
passwords to go undetected, putting sensitive information at risk. There is a need
for a reliable and efficient method for testing password strength that can identify
weak passwords and provide recommendations for improvement. By developing
such a method, individuals and organizations can take proactive steps to
strengthen their passwords and protect their sensitive information from cyber
threats.
The goal is to create a comprehensive password strength testing solution that can
accurately assess the strength of passwords and provide actionable feedback to
users. This solution should be able to identify weak passwords, provide
recommendations for improvement, and help users create stronger passwords
that are resistant to unauthorized access. By achieving this goal, we can improve
password security and reduce the risk of security breaches caused by weak
passwords.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 3
[TESTING PASSWORD STRENGTH]
3. LITERATURE REVIEW
Overview:
Password strength testing is a critical component of password security, and
numerous studies have explored various approaches to evaluating password
strength. Research has shown that weak passwords are a significant security risk,
and effective password strength testing methods are essential for identifying and
mitigating these risks.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 4
[TESTING PASSWORD STRENGTH]
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 5
[TESTING PASSWORD STRENGTH]
4. DATA COLLECTION
Data Sources
1. Password datasets: Publicly available datasets of passwords, such as
those leaked from websites or collected through surveys.
Data Characteristics
1. Password length: Collecting data on password length, including the
number of characters and character types (e.g., uppercase, lowercase, numbers,
special characters).
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 6
[TESTING PASSWORD STRENGTH]
Data Preprocessing
1. Data cleaning: Removing any sensitive or personally identifiable
information from the collected data.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 7
[TESTING PASSWORD STRENGTH]
5. SYSTEM STUDY
Password strength testing software, such as John the Ripper and Hashcat, can be
used to test the strength of passwords and identify potential vulnerabilities. These
tools are often used by security professionals to assess the strength of passwords
and identify areas for improvement.
Browser extensions, such as Password Strength Checker, can provide users with
real-time feedback on password strength and offer recommendations for
improvement. These extensions can be a convenient way for users to evaluate
password strength without having to visit a separate website.
Overall, existing systems for testing password strength provide users with a range
of options for evaluating and improving their password security.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 8
[TESTING PASSWORD STRENGTH]
5.2. DISADVANTAGES
2. Limited scope: Password strength testing may not account for other
security risks, such as phishing or social engineering attacks.
User Experience
1. Frustration: Password strength testing can be frustrating for users if the
requirements are too stringent or if the feedback is unclear.
Technical Limitations
1. Inaccurate assessments: Password strength testing tools may not always
accurately assess password strength, potentially leading to false positives or false
negatives.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 9
[TESTING PASSWORD STRENGTH]
Resource Intensive
1. Computational resources: Password strength testing can be
computationally intensive, potentially impacting system performance.
System Components
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 10
[TESTING PASSWORD STRENGTH]
System Architecture
1. Front-end: Built using HTML, CSS, and JavaScript, with a user-friendly
interface for password input and report display.
System Workflow
1. User Input: User inputs their password for evaluation.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 11
[TESTING PASSWORD STRENGTH]
System Features
1. Password Strength Evaluation: Evaluates password strength based on
metrics such as length, complexity, and entropy.
System Benefits
1. Improved Password Security: Helps users create stronger passwords,
reducing the risk of password-related security breaches.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 12
[TESTING PASSWORD STRENGTH]
System Requirements
1.Hardware: Requires a server with sufficient processing power, memory, and
storage.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 13
[TESTING PASSWORD STRENGTH]
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 14
[TESTING PASSWORD STRENGTH]
5.4. ADVANTAGES
Improved Security
1. Stronger passwords: Testing password strength helps ensure that
passwords are strong and resistant to unauthorized access.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 15
[TESTING PASSWORD STRENGTH]
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 16
[TESTING PASSWORD STRENGTH]
6. METHODOLOGY
6.1. ENHANCEMENTS
Enhancements in testing password strength have led to the development of
various tools and techniques that provide more accurate and comprehensive
assessments.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 17
[TESTING PASSWORD STRENGTH]
Password Monster: Provides a free password strength test, estimating the time
it would take to crack a password.
Bit warden: Provides a password strength test, estimates the time to crack a
password, and offers secure password sharing and management features.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 18
[TESTING PASSWORD STRENGTH]
7. IMPLEMENTATIONS
Implementations in testing password strength involve various techniques and
tools to evaluate the strength of passwords.
1. John the Ripper: A popular password cracking tool that can be used to
test password strength.
2. Hash cat: A password cracking tool that can be used to test password
strength and recover lost passwords.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 19
[TESTING PASSWORD STRENGTH]
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 20
[TESTING PASSWORD STRENGTH]
8. SYSTEM SPECIFICATIONS
The hardware requirements for testing password strength can vary depending
on the specific tools and techniques used:
Basic Requirements
1. Processor: A modern CPU with multiple cores (at least 2-4 cores) is
recommended for efficient password strength testing.
Advanced Requirements
1. GPU acceleration: For advanced password cracking tools like Hashcat, a
high-end GPU (e.g., NVIDIA or AMD) can significantly improve performance.
Additional Considerations
1. Power supply: A reliable power supply is essential for systems with
highperformance GPUs or multiple GPUs.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 21
[TESTING PASSWORD STRENGTH]
Hardware Requirements
1. Processor: A modern CPU with multiple cores (at least 2-4 cores) is
recommended for efficient password strength testing.
Software Requirements
1. Operating System: A 64-bit operating system (e.g., Windows, Linux, or
macOS) is recommended.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 22
[TESTING PASSWORD STRENGTH]
2. Password Testing Tools: Specific tools like John the Ripper, Hashcat, or
other password cracking software.
Additional Requirements
1. Password Datasets: A collection of passwords or password hashes to test.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 23
[TESTING PASSWORD STRENGTH]
JavaScript Libraries
1. zxcvbn: A JavaScript library that estimates password strength based on
length, complexity, and common patterns.
Other Tools
1. Password Strength Meter: A JavaScript-based tool that evaluates
password strength and provides a strength meter.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 24
[TESTING PASSWORD STRENGTH]
These frontend tools can be integrated into web applications to provide instant
feedback to users about password strength and help them create stronger
passwords.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 25
[TESTING PASSWORD STRENGTH]
2. Burp Suite: A security testing framework that includes tools for testing
password strength.
3. OWASP ZAP: A security testing framework that includes tools for testing
password strength.
Other Tools
1. Password analyzers: Custom-built tools or scripts that analyze password
strength based on specific requirements.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 26
[TESTING PASSWORD STRENGTH]
To run project install python 3.7 and then install MYSQL database and then
copy content from “DB.txt” file and paste in MYSQL to complete database
creation
Now double click on run.bat file to start python web server and get below page
In above screen python web server started and now open browser and enter
URL as http://127.0.0.1:8000/index.html and press enter key to get below page
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 27
[TESTING PASSWORD STRENGTH]
In above screen click on ‘New User Signup’ link to get below sign up page
In above screen user will enter required signup details and then press button to
get below capture face and give valid mail id to received recovery email for
password
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 28
[TESTING PASSWORD STRENGTH]
In above screen in web cam you can capture face by clicking on ‘Take
Snapshot’ button and then click on ‘Click Here to Complete Signup Task’ button
to complete signup and get below page
In above screen face capture completed and now click on ‘Click Here to
Complete signup’ to get below page
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 29
[TESTING PASSWORD STRENGTH]
In above screen in red colour text can see user face details saved in database and
sign up completed and now click on ‘User Login’ link to login as user
In above screen giving correct username and password and then will get below
welcome page
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 30
[TESTING PASSWORD STRENGTH]
In above screen got message as ‘successful login’ and now logout and enter
incorrect password to continue with multi authentication phases
In above screen giving incorrect password and then press button to get below
page
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 31
[TESTING PASSWORD STRENGTH]
In above screen system asking user to enter answers for hint questions and then
press button to get Face Validation with webcam
In above screen user is showing face and then Take Snapshot and click on
‘Validate User’ button to validate face and upon successful will get below
output
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 32
[TESTING PASSWORD STRENGTH]
In above screen user face authenticated successfully and password sent to mail
like below screen
In above screen password received to email. Similarly you can run project by
following above steps.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 33
[TESTING PASSWORD STRENGTH]
11.FUTURE SCOPE
The future scope for testing password strength is promising, with several
trends and advancements shaping the landscape:
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 34
[TESTING PASSWORD STRENGTH]
Future Directions
1. Integration with Security Frameworks: Password strength testing tools
will likely be integrated with broader security frameworks to provide a more
comprehensive security posture.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 35
[TESTING PASSWORD STRENGTH]
12.APPLICATION
Here are some applications used for testing password strength:
Web-Based Applications
1. Password Meter: A web-based tool that evaluates password strength
based on length, complexity, and other factors.
Desktop Applications
1. John the Ripper: A password cracking tool that can be used to test
password strength.
Mobile Applications
1. Password Strength Checker: A mobile app that evaluates password
strength and provides recommendations for improvement.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 36
[TESTING PASSWORD STRENGTH]
These applications can help users test password strength, identify potential
vulnerabilities, and improve password security.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 37
[TESTING PASSWORD STRENGTH]
2. Test Password Storage: Verify that passwords are stored securely, using
techniques such as hashing and salting.
2. White Box Testing: Test the password system with knowledge of the
internal workings, focusing on specific vulnerabilities.
3. Gray Box Testing: Test the password system with partial knowledge of
the internal workings, combining black box and white box testing approaches.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 38
[TESTING PASSWORD STRENGTH]
3. Password Reset and Recovery: Test the password reset and recovery
mechanisms to ensure that they are secure and effective.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 39
[TESTING PASSWORD STRENGTH]
14. Conclusion
Testing password strength is a vital step in understanding and improving
cybersecurity. Passwords continue to serve as the first line of defense against
unauthorized access to personal and professional accounts. Through the process
of analyzing and evaluating different types of passwords, it has become clear that
strength is largely determined by a combination of length, complexity,
unpredictability, and uniqueness. Weak passwords, especially those using
common words, short lengths, or simple patterns like "123456" or "password",
are consistently vulnerable to brute force and dictionary attacks. These types of
passwords are often guessed within seconds by automated tools, posing a serious
security risk.
In contrast, strong passwords—those that are long and contain a mix of uppercase
and lowercase letters, numbers, and special characters—are much harder to
crack. The use of password strength testing tools demonstrated how even small
improvements in password complexity could drastically increase the time needed
to guess a password. It also became evident that unique passwords for every
account are essential, as reused credentials increase the risk of multiple accounts
being compromised in the event of a single breach.
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 40
[TESTING PASSWORD STRENGTH]
15. REFERENCES
4. Weir, M., Aggarwal, S., Collins, M., & Stern, H. (2010). Testing
metrics for password creation policies by attacking large sets of revealed
passwords. In Proceedings of the 17th ACM Conference on Computer and
Communications Security (pp. 162–175).
5. Shay, R., Komanduri, S., Durity, A. L., Huh, P. S., Mazurek, M. L.,
Segreti, S. M., ... & Cranor, L. F. (2014). Designing password policies for
strength and usability. ACM Transactions on Information and System
Security (TISSEC), 18(4), 13.
6. OWASP Foundation. (n.d.). Password Storage Cheat Sheet. Open
Web Application Security Project (OWASP).
DEPARTMENT OF CSD,SVCET(Autonomous),CHITTOOR 41