-
October 8th, 2004, 12:15 AM
#21
Originally posted here by NeuTron
You need to boot all of the nodes with ClusterKnoppix. This automatically creates an OpenMosix cluster. You only have to start the password cracker on one node but you run it will several instances. The other nodes in the cluster will see that one node has too many processor intensive programs running and they will autmatically lessesn the burden by migrating the extra processes over to themselves.
You still need a program that is written to run a on cluster, right? You were unable to run John.
-
October 8th, 2004, 01:09 AM
#22
You need a program that you can run multiple instances of while it is processing from one source. It is tough to make john do this, but not impossible. Cisilia makes it incredibly simpler.
-NeuTron
-
October 8th, 2004, 08:44 AM
#23
Junior Member
NeuTron, quick Q: pwdump2 is not working for me getting the following:
Unable to adjust token privileges: 5
Failed enabling Debug privilege. Proceeding anyway
Failed to open lsass: 5. Exiting.
So my Q is: If using knoppix I get the SAM file, through C:\windows\system32\config\SAM
and rename it to lets say passwd.txt, would that do the job ?
Second issue: You mentioned that the work load is automatically synchronized among all the nodes of the cluster, is that true for all applications ? do they have all to support this specific OpenMosis kernel ??
Thanks for any feedback you may provide
-
October 8th, 2004, 12:26 PM
#24
so what your saying is that a 50 node cluster needs 50 copies of clusterknoppix.....its gonna be a LONG night
Only if you have one burner.. if you have 5 or more burners.. you have a choice as to how you go about it.. did 5 copies using 3 machines in half an hour this afternoon .. with delays.. will play with the disks 2morrow.. saturday..yay.. I dont care abot the pwd cracking.. it is the simple clustering.. I got a nu toy..
"Consumer technology now exceeds the average persons ability to comprehend how to use it..give up hope of them being able to understand how it works." - Me http://www.cybercrypt.co.nr
-
October 8th, 2004, 04:16 PM
#25
Actually you only need ONE cd. The clusterknoppix distro comes with a DHCP and PXE server which will allow you to net boot all your clients into the cluster after the PXEserver is started. Worked great for me on about 10 machines I used for a test run, I plan to do about 90 tonight, 
-Maestr0
PS. Ao-Protected, you need to use an account that has Admin and Debug privileges to dump the LSA secrets. The SAM file itself is not what you want as it contains much more info than just the usernames and pwd hashes.
\"If computers are to become smart enough to design their own successors, initiating a process that will lead to God-like omniscience after a number of ever swifter passages from one generation of computers to the next, someone is going to have to write the software that gets the process going, and humans have given absolutely no evidence of being able to write such software.\" -Jaron Lanier
-
October 8th, 2004, 09:25 PM
#26
ive burned 5 copies already and plan on using them on my net in my room...gonna get my dad's sam and crack it hehehe
right now what me and my friend are trying to do is get our school to let us use the science computer lab during lunch time and use live distros to mess around....theres more to it but 50 P4 w 256 DDR all networked over a 4mbs connection....gonna be fun 
<edit>
sorry forgot to mention my dad forgot his password and wants on his computer with access to his files...did not mean any bad display...my error...yes i deserve the negs
</edit>
work it harder, make it better, do it faster, makes us stronger
-
October 9th, 2004, 11:30 PM
#27
ClusterSluts
Cluster night went well, had lots of fun with OpenMosix. I was able to crack 15 passwords between 7 and 15 characters alphanumeric, using Cisilia all were cracked within 2 hours. Unfortunately I was unable to get Cisilia to spawn more than 13 processes (I believe this is a problem in her code), so many of the 90 nodes were set on POVray and other valuable processes wasting tasks . I had some limited success getting JtR to run parallel, there are some tricks you can use for dictionary attacks but the secret of brute forcing eludes me for now. There are two programs to aid in this 'pljohn' (a perl script that wraps multiple JtR processes and uses a pipe) or its C counterpart 'forkjohn'. Some of the nodes were booted into X, some booted using the CHAOS kernel. The 2.6 Kernel on the clusterknoopix CD does not appear to support OpenMosix correctly but the 2.4 worked fine. All nodes were booted from the OpenMosicTerminalServer (DHCP,PXE). There's nothing quite like seeing the 90GB of available RAM. Thanks for the fun tip NeuTron, I'd like to hear if anyone else experiments with this. Also credit goes to my 2 lab monkeys appearing in the photos for their help in booting 90 machines repeatedly. 
-Maestr0
All nodes were running on DELL GX-270's, running 2.8Ghz P4's with 1 GB RAM and e1000 gigabit network cards.
\"If computers are to become smart enough to design their own successors, initiating a process that will lead to God-like omniscience after a number of ever swifter passages from one generation of computers to the next, someone is going to have to write the software that gets the process going, and humans have given absolutely no evidence of being able to write such software.\" -Jaron Lanier
-
October 11th, 2004, 06:41 PM
#28
Member
Re: ClusterSluts
Maestr0,
You just wish you could live the life of a lab monkey for ever...
BigDick (you know who)
-
October 12th, 2004, 07:27 AM
#29
Junior Member
warning noob question ;)
Now this was a very nice post.. However i have a couple of questions that i hope somone could help me with
I have recently installed a w-lan at home and i want to test the security on my router.
Im using a 128 bit wep encryption.. is there anyway to make a cluster that could help me with trying to crack that wep key?
thnx for a nice post
-
October 12th, 2004, 10:30 PM
#30
Actually, there is a tool which was designed to audit WEP keys using multiple machines(like a cluster). Its called SCOUT.
the cracker part of the tool can be comfortably parallelized and run on a cluster or a grid.
http://www.security.iitk.ac.in/IITKH...apers/cp01.pdf
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|