Ресурсы по бруту хешей

TryAga1n

Посетитель
Наставник
Сообщения
26
Реакции
363

mak

Соломенные сандалии
Администратор
Сообщения
575
Реакции
314
Я видел только веб сервисы или торрент архивы с базами, а есть ли сайты, где можно запросы на брут оставлять?! Нужна ли нам такая тема здесь - "Запросы на брут"?! Я не знаю, есть ли тут кто-то, кто этим увлекается. Обычно эти юзеры имеют доступ к большим мощностям. Может кто встречал альтернативные решения?! Что-то вроде Cloud сервисов, какие есть ещё кроме Amazon EC2 ?

Hacker uses cloud computing to crack passwords
A German hacker claims to have used cloud computing to crack passwords
stored in an algorithm that was developed by the NSA.
Hacker Thomas Roth announced on Tuesday that he has used one of Amazon
Web Service's Cluster GPU Instances[1] to crack the passwords encrypted in a
Secure Hashing Algorithm (SHA1) hash.
"I think that cloud cracking can be useful in the future because of its massive
parallel nature. You can start a 100 node cracking cluster with just a few clicks,"
Roth told ZDNet UK on Tuesday.
"GPUs are known to be the best hardware accelerator for cracking passwords, so
I decided to give it a try: How fast can this instance type be used to crack SHA1
hashes? Using the [Cuda-Multiforcer], I was able to crack all hashes from [the
560 character SHA1 hash] with a password length from one to six in only 49
minutes (one hour costs $2.10 [£1.30] by the way)," Roth wrote on his blog.[2]
A SHA1 hash is an encryption algorithm. SHA1 is vulnerable to a brute-force
attack, which is the same technique as the Multiforcer that Roth employed. This is
a technique where computers are used to repeatedly attempt to crack a password
by successively trying varying combinations of numbers and digits.
The Cluster GPU Instance is built around two Nvidia Tesla Fermi-architecture
GPUs. Tesla uses Cuda, an Nvidia-developed software interfacing architecture
that allows code to be written for the Tesla GPU that ekes out maximum
performance from the underlying hardware. Roth used a Cuda-specific script to
increase the effectiveness of his hack, he wrote.
Roth told ZDNet UK that to be suitable for computation on Cuda[3], tasks must be
able to be broken down into many smaller tasks that do not need to share data
with each other and can run in parallel.
Since 2005, SHA1 has also been vulnerable to an attack that is 2,000 times as
effective[4] as a brute-force attack.
In May Verisign reported[5] that botnets were available for hire for as little as
$8.94 an hour to carry out cybercrimes.
Update
SHA1 is a hashing algorithm, not an encryption algorithm, as was first reported in
this article. SHA1 generates a 160-bit hash of a message. Roth's cloud cracking
experiment worked by working through all inputs to create the same output as the
original SHA1 hash.
Cracking Passwords In The Cloud: Amazon’s New EC2 GPU Instances
https://web.archive.org/web/2011021...g-in-the-cloud-amazons-new-ec2-gpu-instances/


As of today, Amazon EC2 is providing what they call “Cluster GPU Instances”: An instance in the Amazon cloud that provides you with the power of two NVIDIA Tesla “Fermi” M2050 GPUs. The exact specifications look like this:

22 GB of memory
33.5 EC2 Compute Units (2 x Intel Xeon X5570, quad-core “Nehalem” architecture)
2 x NVIDIA Tesla “Fermi” M2050 GPUs
1690 GB of instance storage
64-bit platform
I/O Performance: Very High (10 Gigabit Ethernet)
API name: cg1.4xlarge
GPUs are known to be the best hardware accelerator for cracking passwords, so I decided to give it a try: How fast can this instance type be used to crack SHA1 hashes?

Using the CUDA-Multiforce, I was able to crack all hashes from this file with a password length from 1-6 in only 49 Minutes (1 hour costs 2.10$ by the way.):

Compute done: Reference time 2950.1 seconds
Stepping rate: 249.2M MD4/s
Search rate: 3488.4M NTLM/s
This just shows one more time that SHA1 for password hashing is deprecated – You really don’t want to use it anymore! Instead, use something like scrypt or PBKDF2! Just imagine a whole cluster of this machines (Which is now easy to do for anybody thanks to Amazon) cracking passwords for you, pretty comfortable
:-)
Large scaling password cracking for everybody!

Some more details:
If I find the time, I’ll write a tool which uses the AWS-API to launch on-demand password-cracking instances with a preconfigured AMI. Stay tuned either via RSS or via Twitter.

Installation Instructions:

I used the “Cluster Instances HVM CentOS 5.5 (AMI Id: ami-aa30c7c3)” machine image as provided by Amazon (I choosed the image because it was the only one with CUDA support built in.) and selected “Cluster GPU (cg1.4xlarge, 22GB)” as the instance type. After launching the instance and SSHing into it, you can continue by installing the cracker:

I decided to install the “CUDA-Multiforcer” in version 0.7, as it’s the latest version of which the source is available. To compile it, you first need to download the “GPU Computing SDK code samples“:

Bash:
# wget  http://developer.download.nvidia.com/compute/cuda/3_2/sdk/gpucomputingsdk_3.2.12_linux.run
# chmod +x gpucomputingsdk_3.2.12_linux.run
# ./gpucomputingsdk_3.2.12_linux.run
(Just press enter when asked for the installation directory and the CUDA directory.)
Now we need to install the g++ compiler:

Bash:
# yum install automake autoconf gcc-c++
The next step is compiling the libraries of the SDK samples:

Bash:
# cd ~/NVIDIA_GPU_Computing_SDK/C/
# make lib/libcutil.so
# make shared/libshrutil.so
Now it’s time to download and compile the CUDA-Multiforcer:

Bash:
# cd ~/NVIDIA_GPU_Computing_SDK/C/
# wget http://www.cryptohaze.com/releases/CUDA-Multiforcer-src-0.7.tar.bz2 -O src/CUDA-Multiforcer.tar.bz2
# cd src/
# tar xjf CUDA-Multiforcer.tar.bz2
# cd CUDA-Multiforcer-Release/argtable2-9/
# ./configure && make && make install
# cd ../
As the Makefile of the CUDA-Multiforcer doesn’t work out of the box, we need to open it up and find the line

Bash:
CCFILES := -largtable2 -lcuda
Replace CCFILES with LINKFLAGS so that the line looks like this:

Bash:
LINKFLAGS := -largtable2 -lcuda
And type make. If everything worked out, you should have a file ~/NVIDIA_GPU_Computing_SDK/C/bin/linux/release/CUDA-Multiforcer right now. You can try the Multiforcer by doing something like this:

Bash:
# export LD_LIBRARY_PATH=/usr/local/lib:$LD_LIBRARY_PATH
# export LD_LIBRARY_PATH=/usr/local/cuda/lib64:$LD_LIBRARY_PATH
# cd ~/NVIDIA_GPU_Computing_SDK/C/src/CUDA-Multiforcer-Release/
# ../../bin/linux/release/CUDA-Multiforcer -h SHA1 -f test_hashes/Hashes-SHA1-Full.txt --min=1 --max=6 -c charsets/charset-upper-lower-numeric-symbol-95.chr
Congratulations, you now have a fully working, CUDA-based hash-cracker running on an Amazon EC2 instance.
 
Верх Низ