Cracking WPA2-PSK in the Cloud | A Cost Effective Solution for Brute Force Attacks

Discussion in 'eBooks, PDFs, Videos & MP3s' started by Mr. Penguin, 31 Jul 2012.

  1. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,085
    Likes Received:
    1,186
    Trophy Points:
    351
    Here attached is a powerpoint lecture slide written by Fotios Lindiakos and Ed Rowland. This is also available to view on LiveShare.

    Slide Contents & Summary
    1. Cracking WPA2-PSK in the cloud A Cost Effective Solution For Brute Force Attacks By Fotios Lindiakos and Ed Rowland

    2. WPA2-PSKWi-Fi Protected Access II – Pre-shared Key Replaced WPA in 2004 as 802.11i standard Added security replacing TKIP with CCMP (AES) Required for devices with Wi-Fi trademark Two modes Enterprise – requires a Radius Server (802.1x) Personal – 256 bit key created from a string of 64 digits or 8-63 character passphrase Key calculation Passphrase à PBKDF2 (f) salted w/SSID à 4096 iterations of HMAC-SHA1

    3. WPA2-PSK/802-11i4 Way Handshake Goal - derive Passphrase from PMKCorrect Passphrase “guessed” if tool can calculate the same Message Integrity Code (MIC) Hacking Exposed - Stuart McClure, Joel Scambray, George Kurtz

    4. Tools Used Amazon’s EC2 cloud Multiple types of instances running 64 bit Ubuntu 10.04 LTSAircrack-ng v1.1Custom web front end Custom code to parallelize processing Laptop/mobile device running aircrack-ng to capture and send capture file to cloud

    5. About The EC2 Cloud One of many proprietary web services Amazon offers providing PAAS, IAAS & SAASElastic Compute Cloud (EC2) virtualizes compute cycles into EC2 compute units (ECU) One ECU provides the equivalent CPU capacity of a 1.0-1.2 GHz 2007 Opteron or Xeon processor Access to an EC2 instance is via SSH leveraging PKI to encrypt a session key

    6. To the cloud!

    7. Cracking Statistics

    8. But what about cracking…One Hundred MILLION keys!

    9. Time to Crack 100,000,000

    10. Optimized for “Bang for your buck”

    11. About Custom Code Written in Ruby Front end is a Sinatra web application Back end is a wrapper around aircrack-ngLibrary handles communicating with EC2Only 234 lines of code

    12. Front End Accepts PCAP from the user Also gets SSID and how many instances to run Creates a “message” for each instance This message is put on a queue waiting for client to come online It contains all the information the client needs Starts cracking instances Waits for results and reports them to the use rafter a key is found, terminates all clients

    13. Back End Pops a message off the queue at boot time Gets the PCAP and full dictionary file Creates smaller wordlists First, makes a list based on “chunk” assigned Breaks that into smaller chunks for reporting purposes Runs aircrack-ng against each chunk Reports progress or the key after every iteration

    14. Tested Instance Types and Cost

    15. Demo

    16. Results – Single Instances

    17. Results – Parallel Instances

    18. Future Work Utilize other EC2 Instance types High End Cluster with GPU33.5 ECU and 2 x NVIDIA Tesla “Fermi” M2050 GPUsOptimize cracking client for architecture Fully utilize multiple CPU/core Fully utilize 64 bit capabilities Fully utilize GPU acceleration Look at other cracking tools coWPAtty, Hydra, custom code

    19. Conclusion It’s certainly inexpensive and easy to leverage cloud computing to hack WPA2-PSK efficiently As long as you have an adequate dictionary The attack can be prioritized based oncost Use cheaper instances, regardless of timeTimeUse most powerful instances, regardless of cost
     

    Attached Files:

    • Like Like x 1
  2. eyedea007

    eyedea007 Member

    Joined:
    14 Nov 2012
    Messages:
    6
    Likes Received:
    0
    Trophy Points:
    6
    thanks for the file will read it later. :)
     
  3. sussane ng

    sussane ng New Member

    Joined:
    4 Jan 2013
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    1
    How much we have to pay to use the EC2 cloud resource for wpa2 crack ?
     
  4. Alek5

    Alek5 Member

    Joined:
    1 Sep 2013
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    6
    thank you very much mate
     
  5. vmpp

    vmpp Active Member

    Joined:
    20 Nov 2012
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    31
    <p><img class="mceQuattroSmilie mceQuattroSmilieSprite mceSmilie1" title="Smile" src="styles/default/xenforo/clear.png" alt=":)" data-smilie="yes" />&nbsp;thanks</p>
    <p>&nbsp;</p>
     
  6. Andres octavio

    Joined:
    10 Feb 2014
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    6
    I'd like to try that cloud,2 questions... How to get there, and the prise . Thanks
     
  7. GeekDeveloper

    GeekDeveloper Active Member

    Joined:
    21 Dec 2013
    Messages:
    31
    Likes Received:
    1
    Trophy Points:
    38
    yo, can we use that cloud too?
     
  8. sbody0742

    sbody0742 New Member

    Joined:
    21 Mar 2014
    Messages:
    15
    Likes Received:
    0
    Trophy Points:
    1
    ^what he said.
     
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K