National Repository of Grey Literature 24 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Metadata Analysis of Cracking Password Task
Pokorný, Šimon ; Hranický, Radek (referee) ; Veselý, Vladimír (advisor)
This thesis deals with the design and implementation of the analytical web dashboard for remote administration of the Fitcrack system. This system is used for distributed password recovery. Web administration is a single-page application which is divided into a server and client part. These parts communicate with each other. There is a lot of information across the system that logged into a database for later analysis or displayed in real-time for the user. The best form to show data is a graphical element of various types (arrow, graph, table, square) and different colors showing what is happening.
Password Cracking Using PRINCE Algorithm and Fitcrack System
Bolvanský, Dávid ; Ryšavý, Ondřej (referee) ; Hranický, Radek (advisor)
The PRINCE algorithm is a faster and more advanced version of a combination attack. Non-distributed password breaking often encounters its limits, and its applicability to real tasks decreases due to the increasing demand for computing resources of the device. The aim of this work is to design a distributed version of the the PRINCE attack as an extension of Fitcrack system, which focuses on distributed password cracking. The proposed design is implemented and integrated into the Fitcrack system. The work examines the PRINCE attack on a set of experiments, which examines the impact of various configuration options. Part of the experimental part is a comparison of the PRINCE attack with the dictionary and combination attack. The purpose of the comparison is to find cases where the PRINCE attack is better than other attacks. Finally, the integrated PRINCE attack solution in the Fitcrack system is compared with the solution implemented in the Hashtopolis system.
Optimization of Task Distribution in Fitcrack System
Ženčák, Tomáš ; Ryšavý, Ondřej (referee) ; Hranický, Radek (advisor)
The goal of this thesis is the optimization of task distribution in the Fitcrack system. The improvement is reached by way of increasing the accuracy of the estimation of the computational power of worker nodes, and the prevention of the creation of extremely small tasks, as well as increasing the efficiency of the transfer of the tasks to the worker nodes. In this thesis, the current state of the Fitcrack system is described, tested, and evaluated. This thesis then describes the weak points of the current implementation, proposes ways of remediating them and describes, tests and evaluates the implementation of those proposals.
Wi-Fi Password Cracking
Šopf, Petr ; Tisovčík, Peter (referee) ; Orsák, Michal (advisor)
This bachelor's thesis deals with the issues of Wi-Fi networks security. The first part of thesis is about security options and issues related to those options. Next part compares most used tools for Wi-Fi attacks and lists features of those tools. Best tool is then used and software for sniffing communication between access point and client is created. Sniffing tool is created in two version, one version is used for standalone devices and another one for probe developed on FIT BUT.
Analysis of Distributed Computing Technologies for Password Cracking
Mráz, Patrik ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
The goal of this thesis is to analyze the technologies for distributed computing in password cracking. Distribution is a key factor regarding the total time of cracking the password which can sometimes take up to tens of years. In the introductory section we take a look at the general password cracking, types of attacks and the most popular tools. Next we address the GPU parallelization as well as the need of distributed computing on multiple computers. We look at all kinds of technologies, such as VirtualCL, BOINC, MPI and analyze their usability in password cracking. We examine each technology's performance, efficiency, scalability and adaptability when given pre-defined conditions. Part of this thesis is a design and implementation of distributed password cracking using MPI technology along with Hashcat, a self-proclaimed World's fastest password cracker.
Administration of Computing Tasks in Fitcrack System
Horák, Adam ; Zobal, Lukáš (referee) ; Hranický, Radek (advisor)
The aim of this thesis is to design and implement extensions for the Fitcrack system management application. The system is used to crack hashes and recover passwords from encrypted files. It works by distributing computation tasks across multiple computers and includes many configuration options. The extensions outlined in this thesis are meant to aid the user in creating and working with jobs in the system. These include grouping jobs, batch running, and exporting to a file.
Influence of Network Infrastructure on Distributed Password Cracking
Eisner, Michal ; Zobal, Lukáš (referee) ; Hranický, Radek (advisor)
Password cracking is a process used to obtain the cracking key through which we get access to encrypted data. This process normally works on the principle of  the repeated try of attempts and their verification by making calculations of cryptographic algorithms. The difficulty of algorithms affects the time spent on solving of the calculations. In spite of various acceleration methods, it is often necessary to distribute the given problem among  several nodes which are interconnected via the local network or the internet. The aim of this thesis is to analyze the influence of network infrastructure on the speed, the scalability, and the utilization during different attacks on cryptographical hashes. For these purposes, there was created an automatized experimental environment, which consists of distinctive topologies, scripts, and sets of testing tasks. Based on the results of the analysis, which were obtained by the usage of tools Fitcrack and Hashtopolis it was possible to observe this influence.
Automated Creation of Password Mangling Rules
Drdák, Dominik ; Zobal, Lukáš (referee) ; Hranický, Radek (advisor)
In the process of password cracking by a dictionary attack, the password repertoire is limited by the used dictionary. With the help of rules that can modify passwords from a dictionary, it is possible to extend such a dictionary with additional passwords. In order to maximize the benefits of these rules in password cracking, the rules can be generated based on existing data. Frequent patterns, such as capitalization, numbers at the end or frequently used substrings in passwords can be found in databases of leaked passwords. Based on the patterns obtained, a set of clever rules can be created that can significantly improve the success of a password cracking by dictionary attack. The gist of the work is based on this knowledge and presents specific methods for the implementation of these procedures. The work describes the design and implementation of such tool that can create a set of rules from existing passwords based on their similarity. The functionality of the tool and especially the benefits of the chosen method are shown experimentally.
Distributed Password Recovery Using Hashcat Tool
Zobal, Lukáš ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
The aim of this thesis is a distributed solution for password recovery, using hashcat tool. The basis of this solution is password recovery tool Fitcrack, developed during my previous work on TARZAN project. The jobs distribution is done using BOINC platform, which is widely used for volunteer computing in a variety of scientific projects. The outcome of this work is a tool, which uses robust and reliable way of job distribution across a local or the Internet network. On the client side, fast and efficient password recovery process takes place, using OpenCL standard for acceleration of the whole process with the use of GPGPU principle.
Analysis of Hashcat Performance under Different Combinations of Attacks and Their Parameters
Pupakis, Sotirios ; Pluskal, Jan (referee) ; Dolejška, Daniel (advisor)
Hashcat je program, který je použit pro lámání hesel. Lámání probíhá za použití různých způsobů útoku, které se také můžou kombinovat. Kombinace některých vektorů útoků může vyústit v zhoršenou výkonnost lámání. Cílem této práce je změřit, jak moc kombinace různých útoků ovlivňuje výkonnost lámání hesel, najít nejhorší možné kombinace a porovnat jejich výkon vůči nejlepším kombinacím. Toto nám do budoucna umožní lépe pochopit, jak různé útoky ovlivňují výkonnost lámání a také kterým kombinacím se vyhnout.

National Repository of Grey Literature : 24 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.