National Repository of Grey Literature 24 records found  previous11 - 20next  jump to record: Search took 0.01 seconds. 
Analysis of Available GPUs for Password Cracking Purposes
Hrmo, Richard ; Ryšavý, Ondřej (referee) ; Hranický, Radek (advisor)
Táto práca sa zameriava na určenie najdôležitejších hardvérových parametrov grafických kariet pre účely lámania hesiel. Zahŕňa teoretickú štúdiu ohľadom lámania hesiel a preskúmanie rôznych metodík útokov. Práca obsahuje aj prehľad aktuálne dostupných GPU a ich hardvérových parametrov. Ďalej sa zaoberáme nástrojom hashcat, ktorý budeme používať na testovanie GPU. Ďalej práca vysvetľuje návrh nástroja na meranie výkonu pri lámaní hesiel, ktorého jadrom je hashcat a vysvetľuje jeho implementáciu. V analytickej časti sa zaoberáme zozbieranými údajmi, analyzujeme ich, skúmame ich podobnosti a protiklady a určujeme, ktoré hardvérové vlastnosti GPU sú najdôležitejšie pre dobrý výkon pri lámaní hesiel.
Knowledge of Password Characteristics in Cracking Tasks
Hríbik, Samuel ; Polčák, Libor (referee) ; Hranický, Radek (advisor)
Táto bakalárska práca sa zaoberá metódami, ktorými uživatelia vytvárajú heslá, a tým, aký vplyv môžu mať zásady pre tvorbu hesiel na tieto metódy. Na základe zistených informácií o uživateľských zvyklostiach a často využívaných zásadách navrhuje proces na analýzu a generovanie masiek hesiel s využitím znalostí o vlastnostiach hesiel. Opisuje implementáciu procesu generovania masiek a spôsob, akým je tento proces integrovaný do nástroja na lámanie hesiel Fitcrack ako jeho rozšírenie. Nakoniec obsahuje výsledky experimentov s použitím procesu generovania masiek, ktoré prezentujú funkčnosť tohto rozšírenia v rôznych prípadoch použitia.
Interactive Tool for Creating Password-Mangling Rules
Mládek, Jiří ; Pluskal, Jan (referee) ; Hranický, Radek (advisor)
The aim of this bachelor thesis was to create an interactive tool for creating password-mangling rules and integrate it into the Fitcrack system. In this thesis, I discuss password-mangling rules which use several available rule functions and can be used to enrich a dictionary attack. The implemented tool also provides a live preview of mangled passwords, allowing the creation of new more efficient dictionaries. The motivation for creating the tool was the current way of creating rules, where existing tools do not offer a graphical user interface and a large selection of rule functions at the same time. The experiments are then used to demonstrate use cases and the benefits of the tool. User testing is also part of the thesis.
Integration Tests of the Fitcrack System in Selenium
Rucký, Viktor ; Polčák, Libor (referee) ; Hranický, Radek (advisor)
Fitcrack je systém pro distribuované lámání hesel vyvíjený na VUT FIT. Fitcrack je používán hlavně skrz webové rozhraní. Fitcrack je relativně velký projekt, kterému ale chybí sada automatických integračních testů. Selenium je projekt pro automatizované ovládání webových prohlížečů. Tato bakalářská práce má za cíl navrhnout sadu integračních testů, které budou implementované pomocí projektu Selenium. Návrh sady testů je založen na modelu page-object, způsob jak oddělit kód pro interakci s uživatelským rozhraním od testů. Testy jsou implementovány v jazyku Python pomocí frameworku Pytest.
Password Cracking Using PRINCE Algorithm and Fitcrack System
Bolvanský, Dávid ; Ryšavý, Ondřej (referee) ; Hranický, Radek (advisor)
The PRINCE algorithm is a faster and more advanced version of a combination attack. Non-distributed password breaking often encounters its limits, and its applicability to real tasks decreases due to the increasing demand for computing resources of the device. The aim of this work is to design a distributed version of the the PRINCE attack as an extension of Fitcrack system, which focuses on distributed password cracking. The proposed design is implemented and integrated into the Fitcrack system. The work examines the PRINCE attack on a set of experiments, which examines the impact of various configuration options. Part of the experimental part is a comparison of the PRINCE attack with the dictionary and combination attack. The purpose of the comparison is to find cases where the PRINCE attack is better than other attacks. Finally, the integrated PRINCE attack solution in the Fitcrack system is compared with the solution implemented in the Hashtopolis system.
Optimization of Task Distribution in Fitcrack System
Ženčák, Tomáš ; Ryšavý, Ondřej (referee) ; Hranický, Radek (advisor)
The goal of this thesis is the optimization of task distribution in the Fitcrack system. The improvement is reached by way of increasing the accuracy of the estimation of the computational power of worker nodes, and the prevention of the creation of extremely small tasks, as well as increasing the efficiency of the transfer of the tasks to the worker nodes. In this thesis, the current state of the Fitcrack system is described, tested, and evaluated. This thesis then describes the weak points of the current implementation, proposes ways of remediating them and describes, tests and evaluates the implementation of those proposals.
Wi-Fi Password Cracking
Šopf, Petr ; Tisovčík, Peter (referee) ; Orsák, Michal (advisor)
This bachelor's thesis deals with the issues of Wi-Fi networks security. The first part of thesis is about security options and issues related to those options. Next part compares most used tools for Wi-Fi attacks and lists features of those tools. Best tool is then used and software for sniffing communication between access point and client is created. Sniffing tool is created in two version, one version is used for standalone devices and another one for probe developed on FIT BUT.
Automated Creation of Password Mangling Rules
Drdák, Dominik ; Zobal, Lukáš (referee) ; Hranický, Radek (advisor)
In the process of password cracking by a dictionary attack, the password repertoire is limited by the used dictionary. With the help of rules that can modify passwords from a dictionary, it is possible to extend such a dictionary with additional passwords. In order to maximize the benefits of these rules in password cracking, the rules can be generated based on existing data. Frequent patterns, such as capitalization, numbers at the end or frequently used substrings in passwords can be found in databases of leaked passwords. Based on the patterns obtained, a set of clever rules can be created that can significantly improve the success of a password cracking by dictionary attack. The gist of the work is based on this knowledge and presents specific methods for the implementation of these procedures. The work describes the design and implementation of such tool that can create a set of rules from existing passwords based on their similarity. The functionality of the tool and especially the benefits of the chosen method are shown experimentally.
Administration of Computing Tasks in Fitcrack System
Horák, Adam ; Zobal, Lukáš (referee) ; Hranický, Radek (advisor)
The aim of this thesis is to design and implement extensions for the Fitcrack system management application. The system is used to crack hashes and recover passwords from encrypted files. It works by distributing computation tasks across multiple computers and includes many configuration options. The extensions outlined in this thesis are meant to aid the user in creating and working with jobs in the system. These include grouping jobs, batch running, and exporting to a file.
Influence of Network Infrastructure on Distributed Password Cracking
Eisner, Michal ; Zobal, Lukáš (referee) ; Hranický, Radek (advisor)
Password cracking is a process used to obtain the cracking key through which we get access to encrypted data. This process normally works on the principle of  the repeated try of attempts and their verification by making calculations of cryptographic algorithms. The difficulty of algorithms affects the time spent on solving of the calculations. In spite of various acceleration methods, it is often necessary to distribute the given problem among  several nodes which are interconnected via the local network or the internet. The aim of this thesis is to analyze the influence of network infrastructure on the speed, the scalability, and the utilization during different attacks on cryptographical hashes. For these purposes, there was created an automatized experimental environment, which consists of distinctive topologies, scripts, and sets of testing tasks. Based on the results of the analysis, which were obtained by the usage of tools Fitcrack and Hashtopolis it was possible to observe this influence.

National Repository of Grey Literature : 24 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.