An Analysis and Comparison of Clustered Password Crackers
نویسنده
چکیده
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of “strong” passwords via pro-active password strengthening utilities and password cracking tools should be employed by system administrators to reduce the number of “weak” passwords in a computer system. With the availability of low-cost computer and networking hardware, clustered solutions for large computational tasks, such as password cracking, are no longer restricted to larger organisations. John the Ripper and Cisilia are two open-source password cracking programs which have the ability to run in a clustered environment. This paper intends to make a comparison of John the Ripper to Cisilia in a clustered environment utilising the OpenMosix and Beowulf styles of parallel computation. Unfortunately, due to problems with Cisilia an in-depth comparative analysis could not be performed, but the analysis of the John the Ripper results does highlight some issues in regards to clustered password cracking.
منابع مشابه
‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security
With the rapid burgeoning of national and international networks, the question of system security has become one of growing importance. High speed inter-machine communication and even higher speed computational processors have made the threats of system ‘‘crackers,’’ data theft, data corruption very real. This paper outlines some of the problems of current password security by demonstrating the...
متن کاملImproving system security via proactive password checking
As the Internet has grown, its user community has changed from a small tight knit group of researchers to a loose gathering of people on a global network. The amazing and constantly growing numbers of machines and users ensures that untrustworthy individuals have full access to that network. High speed inter-machine communication and even higher speed computational processors have made the thre...
متن کاملAn Analysis of Markov Password Against Brute Force Attack for Effective Web Applications
Computer is omnipresent. With massive growth in the field of computers, advancement in digital technology, development in software’s gives improvement to computer field on one side. Hacking the systems and cracking the login Passwords makes the field in endure on the other hand. Authentication to access an application in networks is mostly based on alphanumeric Password. A novel method of Alpha...
متن کاملGraphical Dictionaries and the Memorable Space of Graphical Passwords
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force password crackers using attack dictionaries. This leads us to ask what classes of graphical passwords users find memorable. We postulate one such class supported by a collection of cognitive studies on visual recall, w...
متن کاملOMEN: Faster Password Guessing Using an Ordered Markov Enumerator
Passwords are widely used for user authentication, and will likely remain in use in the foreseeable future, despite several weaknesses. One important weakness is that human-generated passwords are far from being random, which makes them susceptible to guessing attacks. Understanding the adversaries capabilities for guessing attacks is a fundamental necessity for estimating their impact and advi...
متن کامل