Skip to navigation Skip to content
Gotit Pro

Your Friendly Study Co-Pilot

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • Home
  • About
  • Questions
  • Contact & Support
  • My Account
  • Home
  • About
  • Questions
  • Contact & Support
  • My Account
  • $0.00 0 items
Home / Computer Science / Python / Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach.
Sale!
🔍
Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach. Next the program will accept input of two strings representing a potential user name, and password. The files should be read using the file.readlines( ) method. Your program should output the attempted login and password with a message that it was a successful or unsuccessful brute force attempt. Ex: If the input is: input1pass.txt input1shadow.txt bobpickle pa$$w0rd and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: the output is: Brute Force Attempt: Login: user1 Password: XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login: user2 Password: LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login: user3 Password: &^334294kksri. Unsuccessful brute force attempt Ex: If the input is: input2pass.txt input2shadow.txt demo123 password and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin demo123:x:18:54:Demo User:/home/demo123:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: demo123:password:15048:0:99999:7::: the output is: Brute Force Attempt: Login: user1 Password: XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login: user2 Password: LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login: user3 Password: &^334294kksri. Unsuccessful brute force attempt Brute Force Attempt: Login: demo123 Password: password Successful brute force attempt Downloadable files input1pass.txt and input1shadow.txt

Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach.

Rated 5.00 out of 5 based on 3 customer ratings
(4 customer reviews)

$14.00 Original price was: $14.00.$10.00Current price is: $10.00.

Download button will appear immediately after successful payment.

Book your next exam with us and get A+ in entire semester, guaranteed!

— OR —

SKU: 3219 Category: Python Tags: Next the program will accept input of two strings representing a potential user name and password, These files will contain encrypted and nonencrypted passwords to simulate a Brute Force approach, Write a program that first reads in the name of two input files input1passtxt and input1shadowtxt, Your program should output the attempted login and password with a message that it was a successful or unsuccessful brute force attempt
  • Description
  • Reviews (4)

Description

Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach. Next the program will accept input of two strings representing a potential user name, and password. The files should be read using the file.readlines( ) method. Your program should output the attempted login and password with a message that it was a successful or unsuccessful brute force attempt. Ex: If the input is: input1pass.txt input1shadow.txt bobpickle pa$$w0rd and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: the output is: Brute Force Attempt: Login:  user1 Password:  XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login:  user2 Password:  LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login:  user3 Password:  &^334294kksri. Unsuccessful brute force attempt Ex: If the input is: input2pass.txt input2shadow.txt demo123 password and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin demo123:x:18:54:Demo User:/home/demo123:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: demo123:password:15048:0:99999:7::: the output is: Brute Force Attempt: Login:  user1 Password:  XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login:  user2 Password:  LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login:  user3 Password:  &^334294kksri. Unsuccessful brute force attempt Brute Force Attempt: Login: demo123 Password: password Successful brute force attempt Downloadable files input1pass.txt and input1shadow.txt

Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach. Next the program will accept input of two strings representing a potential user name, and password. The files should be read using the file.readlines( ) method.

Your program should output the attempted login and password with a message that it was a successful or unsuccessful brute force attempt.

Ex: If the input is:

input1pass.txt
input1shadow.txt
bobpickle
pa$$w0rd

and the contents of input1pass.txt are:

user1:x:15:51:User One:/home/user1:nologin
user2:x:16:52:User One:/home/user1:nologin
user3:x:17:53:User One:/home/user1:nologin

and the contents of the input1shadow.txt are:

user1:XXPP192920r:15045:0:99999:7:::
user1:LLmm928393x:15046:0:99999:7:::
user1:&^334294kksri.:15047:0:99999:7:::

the output is:

Brute Force Attempt:
Login:  user1
Password:  XXPP192920r
Unsuccessful brute force attempt

Brute Force Attempt:
Login:  user2
Password:  LLmm928393x
Unsuccessful brute force attempt

Brute Force Attempt:
Login:  user3
Password:  &^334294kksri.
Unsuccessful brute force attempt

Ex: If the input is:

input2pass.txt
input2shadow.txt
demo123
password

and the contents of input1pass.txt are:

user1:x:15:51:User One:/home/user1:nologin
user2:x:16:52:User One:/home/user1:nologin
user3:x:17:53:User One:/home/user1:nologin
demo123:x:18:54:Demo User:/home/demo123:nologin

and the contents of the input1shadow.txt are:

user1:XXPP192920r:15045:0:99999:7:::
user1:LLmm928393x:15046:0:99999:7:::
user1:&^334294kksri.:15047:0:99999:7:::
demo123:password:15048:0:99999:7:::

the output is:

Brute Force Attempt:
Login:  user1
Password:  XXPP192920r
Unsuccessful brute force attempt

Brute Force Attempt:
Login:  user2
Password:  LLmm928393x
Unsuccessful brute force attempt

Brute Force Attempt:
Login:  user3
Password:  &^334294kksri.
Unsuccessful brute force attempt

Brute Force Attempt:
Login: demo123
Password: password
Successful brute force attempt

Downloadable files

input1pass.txt and input1shadow.txt

4 reviews for Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach.

  1. Rated 5 out of 5

    Raheel Rahman – August 8, 2022

    Incredibly concise, yet detailed, answer to the question that had me stumped. After receiving the help I so desperately needed, I was like, ‘oh my goodness, I’m an idiot!’ But I mean that as a compliment to my assigned answer specialist. I really really appreciated the prompt service and excellent breakdown of the solution. You really can’t put a price on that, but you guys did, and it was so very worth every penny.

  2. Rated 5 out of 5

    Ed Selee – August 8, 2022

    The assignments I submit are always of great quality and completed on time.

  3. Rated 5 out of 5

    Garfield Fabricius-Davies – August 8, 2022

    Like always, perfect score

  4. Rated 5 out of 5

    Patrick Lorenz – August 8, 2022

    Although the price seems expensive, the solution worked very well. The communication and responses are quite fast. Thank you.

Only logged in customers who have purchased this product may leave a review.

You may also like…

  • Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process. This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader( ) method. The file will contain a list of login_names, followed by login_time separated by commas. Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts Ex: If the input is: input1.csv and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts) bob,2,paula,1,nancy,8,thomas,23,zach,22,charlotte,4 the output is: Anomaly login attempts: nancy:8 thomas:23 zach:22 charlotte:4 Ex: If the input is: input2.csv and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts) the output is: No anomaly login attempts Note: There is a newline at the end of the output, and input1.csv is available to download.

    Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times.

    Rated 5.00 out of 5
    Sale! $7.00 Original price was: $7.00.$5.00Current price is: $5.00.
    Add to cart
Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process. This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader( ) method. The file will contain a list of login_names, followed by login_time separated by commas. Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts Ex: If the input is: input1.csv and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts) bob,2,paula,1,nancy,8,thomas,23,zach,22,charlotte,4 the output is: Anomaly login attempts: nancy:8 thomas:23 zach:22 charlotte:4 Ex: If the input is: input2.csv and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts) the output is: No anomaly login attempts Note: There is a newline at the end of the output, and input1.csv is available to download. Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. 7.9 LAB: Sorting TV Shows (dictionaries and lists) Write program that first reads in the name of an input file and then reads the input file using the file.readlines() method. The input file contains an unsorted list of number of seasons followed by the corresponding TV show. Your program should put the contents of the input file into a dictionary where the number of seasons are the keys, and a list of TV shows are the values (since multiple shows could have the same number of seasons). Sort the dictionary by key (least to greatest) and output the results to a file named output_keys.txt, separating multiple TV shows associated with the same key with a semicolon. Next, sort the dictionary by values (alphabetical order), and output the results to a file named output_titles.txt. Ex: If the input is: file1.txt and the contents of file1.txt are: 20 Gunsmoke 30 The Simpsons 10 Will & Grace 14 Dallas 20 Law & Order 12 Murder, She Wrote the file output_keys.txt should contain: 10: Will & Grace 12: Murder, She Wrote 14: Dallas 20: Gunsmoke; Law & Order 30: The Simpsons and the file output_titles.txt should contain: Dallas Gunsmoke Law & Order Murder, She Wrote The Simpsons Will & Grace Note: There is a newline at the end of each output file, and file1.txt is available to download. Write program that first reads in the name of an input file and then reads the input file using the file.readlines() method.
Have a coupon? Click here to enter your code

— OR —

Billing details

United States (US)

Additional information

Your order

Product
Quantity
Total
Cart Subtotal $0.00
Order Total $0.00

  • Pay with your credit card.

    • We now accept cryptocurrency payments with Cryptomus.

    1. Terms

    By accessing the website at https://gotit-pro.com, you are agreeing to be bound by these terms of service, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this website are protected by applicable copyright and trademark law.

    2. Use License

    1. Permission is granted to temporarily download one copy of the materials (information or software) on “Gotit Pro’s” website for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:
      1. modify or copy the materials;
      2. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
      3. attempt to decompile or reverse engineer any software contained on “Gotit Pro’s” website;
      4. remove any copyright or other proprietary notations from the materials; or
      5. transfer the materials to another person or “mirror” the materials on any other server.
    2. This license shall automatically terminate if you violate any of these restrictions and may be terminated by “Gotit Pro” at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.

    3. Disclaimer

    1. The materials on “Gotit Pro’s” website are provided on an ‘as is’ basis. “Gotit Pro” makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties including, without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights.
    2. Further, “Gotit Pro” does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its website or otherwise relating to such materials or on any sites linked to this site.

    4. Limitations

    In no event shall “Gotit Pro” or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption) arising out of the use or inability to use the materials on “Gotit Pro’s” website, even if “Gotit Pro’s” authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.

    5. Accuracy of materials

    The materials appearing on “Gotit Pro’s” website could include technical, typographical, or photographic errors. “Gotit Pro” does not warrant that any of the materials on its website are accurate, complete or current. “Gotit Pro” may make changes to the materials contained on its website at any time without notice. However “Gotit Pro” does not make any commitment to update the materials.

    6. Links

    “Gotit Pro” has not reviewed all of the sites linked to its website and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by “Gotit Pro” of the site. Use of any such linked website is at the user’s own risk.

    7. Modifications

    “Gotit Pro” may revise these terms of service for its website at any time without notice. By using this website you are agreeing to be bound by the then current version of these terms of service.

    8. Governing Law

    These terms and conditions are governed by and construed in accordance with the laws of Florida and you irrevocably submit to the exclusive jurisdiction of the courts in that State or location.

    © Gotit Pro 2025
    Privacy Policy for Gotit ProBuilt with WooCommerce.
    • My Account
    • Search
      Generic selectors
      Exact matches only
      Search in title
      Search in content
      Post Type Selectors
      Search in posts
      Search in pages
    • Cart 0
    Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach. Next the program will accept input of two strings representing a potential user name, and password. The files should be read using the file.readlines( ) method. Your program should output the attempted login and password with a message that it was a successful or unsuccessful brute force attempt. Ex: If the input is: input1pass.txt input1shadow.txt bobpickle pa$$w0rd and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: the output is: Brute Force Attempt: Login: user1 Password: XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login: user2 Password: LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login: user3 Password: &^334294kksri. Unsuccessful brute force attempt Ex: If the input is: input2pass.txt input2shadow.txt demo123 password and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin demo123:x:18:54:Demo User:/home/demo123:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: demo123:password:15048:0:99999:7::: the output is: Brute Force Attempt: Login: user1 Password: XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login: user2 Password: LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login: user3 Password: &^334294kksri. Unsuccessful brute force attempt Brute Force Attempt: Login: demo123 Password: password Successful brute force attempt Downloadable files input1pass.txt and input1shadow.txt
    You're viewing: Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach. $14.00 Original price was: $14.00.$10.00Current price is: $10.00.
    Rated 5.00 out of 5
    Add to cart