成人免费xxxxx在线视频软件_久久精品久久久_亚洲国产精品久久久_天天色天天色_亚洲人成一区_欧美一级欧美三级在线观看

德國黑客使用租用的計算機資源攻擊散列算法

安全 算法
一個德國安全愛好者使用租用的計算機資源來破解用 SHA1 散列算法生成的單向散列。而這種隨用隨付的計算機資源破解一個 SHA1 散列只需 2 美元。

一個德國安全愛好者使用租用的計算機資源來破解用 SHA1 散列算法生成的單向散列。而這種隨用隨付的計算機資源破解一個 SHA1 散列只需 2 美元。

Thomas Roth 使用基于 GPU 的付費計算機資源來暴力破解 SHA1 散列。密碼專家警告說,最少在五年以后,SHA-1 就已經不能被認為是安全的散列算法,Roth 的實驗的意義不在于他達到了什么目的、用了哪種攻擊方式(實際上只是暴力破解),而是他使用了先進的技術。

像這樣以前需要全世界花費數月時間、大量人力物力的項目,現在只需一人用租用的計算機資源在幾分鐘內就可以完成,而且只需花費區區 2 美元。他用這點錢就租用到了一堆極強的圖形處理器,并使用 Cuda-Multiforcer 破解了密碼。

以下為詳細說明:

As of today, Amazon EC2 is providing what they call "Cluster GPU Instances":  An instance in the Amazon cloud that provides you with the power of two NVIDIA Tesla “Fermi” M2050 GPUs. The exact specifications look like this:

22 GB of memory
33.5 EC2 Compute Units (2 x Intel Xeon X5570, quad-core “Nehalem” architecture)
2 x NVIDIA Tesla “Fermi” M2050 GPUs
1690 GB of instance storage
64-bit platform
I/O Performance: Very High (10 Gigabit Ethernet)
API name: cg1.4xlarge

GPUs are known to be the best hardware accelerator for cracking passwords, so I decided to give it a try: How fast can this instance type be used to crack SHA1 hashes?

Using the CUDA-Multiforce, I was able to crack all hashes from this file with a password length from 1-6 in only 49 Minutes (1 hour costs 2.10$ by the way.):

  1. Compute done: Reference time 2950.1 seconds  
  2. Stepping rate: 249.2M MD4/s  
  3. Search rate: 3488.4M NTLM/s  

This just shows one more time that SHA1 for password hashing is deprecated - You really don't want to use it anymore! Instead, use something like scrypt or PBKDF2! Just imagine a whole cluster of this machines (Which is now easy to do for anybody thanks to Amazon) cracking passwords for you, pretty comfortable  Large scaling password cracking for everybody!

If I find the time, I'll write a tool which uses the AWS-API to launch on-demand password-cracking instances with a preconfigured AMI. Stay tuned either via RSS or via Twitter.

Installation Instructions:

I used the "Cluster Instances HVM CentOS 5.5 (AMI Id: ami-aa30c7c3)" machine image as provided by Amazon (I choosed the image because it was the only one with CUDA support built in.) and selected "Cluster GPU (cg1.4xlarge, 22GB)" as the instance type. After launching the instance and SSHing into it, you can continue by installing the cracker:

I decided to install the "CUDA-Multiforcer" in version 0.7, as it's the latest version of which the source is available. To compile it, you first need to download the "GPU Computing SDK code samples":

  1. # wget 
  2. http://developer.download.nvidia.com/compute/cuda/3_2/
  3. sdk/gpucomputingsdk_3.2.12_linux.run
  4. # chmod +x gpucomputingsdk_3.2.12_linux.run  
  5. # ./gpucomputingsdk_3.2.12_linux.run  
  6. (Just press enter when asked for the installation directory and the CUDA directory.)  

#p#

Now we need to install the g++ compiler:

  1. # yum install automake autoconf gcc-c++  

The next step is compiling the libraries of the SDK samples:

  1. # cd ~/NVIDIA_GPU_Computing_SDK/C/  
  2. # make lib/libcutil.so  
  3. # make shared/libshrutil.so 

Now it's time to download and compile the CUDA-Multiforcer:

  1. # cd ~/NVIDIA_GPU_Computing_SDK/C/  
  2. # wget http://www.cryptohaze.com/releases/CUDA-Multiforcer-src-0.7.tar.bz2 -O src/CUDA-Multiforcer.tar.bz2  
  3. # cd src/  
  4. # tar xjf CUDA-Multiforcer.tar.bz2  
  5. # cd CUDA-Multiforcer-Release/argtable2-9/  
  6. # ./configure && make && make install  
  7. # cd ../  

As the Makefile of the CUDA-Multiforcer doesn't work out of the box, we need to open it up and find the line

  1. CCFILES := -largtable2 -lcuda  

Replace CCFILES with LINKFLAGS so that the line looks like this:

  1. LINKFLAGS := -largtable2 -lcuda  

And type make. If everything worked out, you should have a file ~/NVIDIA_GPU_Computing_SDK/C/bin/linux/release/CUDA-Multiforcer right now. You can try the Multiforcer by doing something like this:

  1. # export LD_LIBRARY_PATH=/usr/local/lib:$LD_LIBRARY_PATH  
  2. # export LD_LIBRARY_PATH=/usr/local/cuda/lib64:$LD_LIBRARY_PATH  
  3. # cd ~/NVIDIA_GPU_Computing_SDK/C/src/CUDA-Multiforcer-Release/  
  4. # ../../bin/linux/release/CUDA-Multiforcer -h SHA1 -f test_hashes/Hashes-SHA1-Full.txt --min=1 --max=6 -c charsets/charset-upper-lower-numeric-symbol-95.chr  

Congratulations, you now have a fully working, CUDA-based hash-cracker running on an Amazon EC2 instance.

【編輯推薦】

  1. 加密的最高境界:一百年無法破解的密碼
  2. 破解“蘑菇”病毒很簡單!
  3. 破解Svchost.exe進程之謎
  4. 破解IIS 6.0默認設置安全性的終極秘籍

 

責任編輯:佟健 來源: cnBeta
相關推薦

2020-12-19 16:38:28

黑客網絡攻擊數據泄露

2010-07-12 09:57:29

2015-11-05 10:04:41

2020-05-19 16:51:54

黑客攻擊超級計算機

2014-11-26 09:55:34

2024-03-06 14:36:08

2023-06-26 10:44:42

2013-03-21 16:07:03

2010-08-10 10:27:18

2024-04-11 14:14:50

2013-05-15 15:03:08

2013-01-25 13:28:13

JavaJava漏洞

2021-02-05 08:05:59

惡意軟件Kobalos超級計算機

2011-10-10 10:58:40

黑客

2016-02-17 10:58:37

2016-02-02 10:03:03

2009-07-27 09:51:48

2021-07-07 11:03:25

黑客網絡安全網絡攻擊

2011-10-11 10:33:12

2022-03-21 18:15:21

黑客網絡攻擊
點贊
收藏

51CTO技術棧公眾號

主站蜘蛛池模板: 韩日精品一区 | 亚洲精品一区国语对白 | 精品国产黄a∨片高清在线 成人区精品一区二区婷婷 日本一区二区视频 | 精品久久国产 | 色免费在线视频 | 成人免费视频网站在线看 | 青青久视频 | 国产偷自视频区视频 | 亚洲资源在线 | 国产成人麻豆免费观看 | 九九热在线免费视频 | 国产精品一区二区三区在线 | 成人精品国产一区二区4080 | aa级毛片毛片免费观看久 | 午夜激情免费 | 在线精品亚洲欧美日韩国产 | 久久久青草婷婷精品综合日韩 | 青青草综合| 亚洲综合视频一区 | 最新超碰| 丁香久久 | 欧美精品电影一区 | 日本中文字幕日韩精品免费 | 精品久久久久久久久久久久 | 青春草国产 | 97超级碰碰 | 精品久久一区 | 国产综合区 | 欧美久久精品一级c片 | 日韩中文字幕高清 | 中文字幕一区在线观看视频 | 一区二区久久 | 99久久精品国产一区二区三区 | 日韩精品一区二区三区中文字幕 | 久久精品中文 | 午夜视频免费在线观看 | 欧美日韩看片 | 精品国产乱码久久久久久a丨 | av福利网| 97视频在线观看网站 | 午夜无码国产理论在线 |