RSS Feed twitter Follow RemoteSec on the Facebook
Remote Security Random Tips
News & Ads

Utilizing multiple CPU cores for password cracking

Cowpatty cracker logoAs the market with CPU has moved to multi-core solutions as a alternative method to increase computation power, intensive computing applications are not adapting to this fact so quickly. A Lot of people still don’t know that the system is not able to split tasks into more threads and distribute the work evenly upon the cores. This task is on the application developer who has to implement the multi-thread supporting mechanism.

Some of the applications we would like to run on multiple cores are coWPAtty, genPMK and airolib-ng. With a little guide and comparison test, we will show you how to do it. Our processor is dual-core Intel Core2Duo clocked to 2.23GHz. For load information we will use the top command and the files to crack, we will use the files (handshake capture and word-list) already distributed with coWPAtty. Just to be complete, we are running a bit modded BackTrack 3 Linux.

Test 1 – Regular dictionary attack on the WPA key with coWPAtty

cowpatty -r /root/wpapsk-linksys.dump -f /root/dict -s linksys

cowPatty using one core of the CPU to crack WPA

top statistics - cowPatty using one core of the CPU to crack WPA

The resulting speed is 81.58 words per second, and as you can see in top, coWPAtty is using only one core.

Test 2 – Dictionary attack on the WPA key with 2 coWPAtty’s running in 2 terms

First we split the supplied word-list into two. The dictionary is about 82 KB big, so the halves will be 41 KB. The command is:

split -b 41k dict

The dictionary is split into two files named xaa and xab.
Now, we’ll open two terminals and run:

cowpatty -r /root/wpapsk-linksys.dump -f /root/xaa -s linksys


cowpatty -r /root/wpapsk-linksys.dump -f /root/xab -s linksys

cowpatty dual core WPA crack-attack

cowpatty útok 1CPU WPA

top statistics - cowPatty using two cores of the CPU to crack WPA

The resulting cracking speed is 78.75 plus 77.53 words per second, so it sums up to 156.28 words/s, and as you can see in the top screenshot, in this case it is using both cores.

Test 3 – airolib-ng

airolib-ng CPU WPA crack

airolib-ng program top linux CPU

The result: 151 PMK/s.

Test 4 – Two airolib-ng’s running paralelly

airolib-ng one CPU core

airolib-ng two CPU cores

top statistics airolib-ng running two CPU cores

The resulting speeds are 148 PMK/s and 102 PMK/s. Now 250 PMK/s is a pretty nice number, isn’t it?. The 50% difference between the two airolib-ng’s is caused by one imported dictionary being bigger as you can see from the screenshots.

If you have quad-core or some other multi-core, the improvement from using this technique will be of course bigger. You just split the dictionaries in more parts and run more instances of your cracking utility. As they run as separate processes and threads, the system can run each one on the next available core. It might seem a bit cucumbersome, but the result is worth it. Of course it’s up to you, how you use this thread dividing technique. It caught my attention when i read about it and want ed to share it with you. :-)

For AMP Security, written by Marcos.

Similar Posts:

1 Diskuze “Utilizing multiple CPU cores for password cracking”

  1. 1 [Video] Cracking WiFi - WPA/WPA2 (Aircrack-ng vs coWPAtty) Pingback on Aug 20th, 2010 at 4:47 pm
Diskuze je uzamčena.