Perimeter
1/10/2011
05:17 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

Cloud-Based Crypto-Cracking Tool To Be Unleashed At Black Hat DC

European researcher will share new 'Cloud Cracking Suite' that leverages GPU processing power in Amazon EC2 cloud to decrypt passwords, break into wireless networks

A European researcher will release an open-source tool at Black Hat DC that uses Amazon's powerful GPU processing services to crack SHA1-based passwords at breakneck speeds.

Thomas Roth, a researcher and consultant for Lanworks AG, last fall revealed how he was able to crack SHA1 encryption using Amazon EC2's newest cloud computing service-for-hire that uses Graphics Processing Units (GPU) processors, which typically are used to execute calculations for graphics-intensive applications.

Roth for the first time will release his so-called Cloud Cracking Suite (CCS) tool at next week's gathering. He says he was able to successfully crack 400,000 passwords per second using eight Amazon Nvidia GPU instances, and 45,000 to 50,000 passwords per second with just one GPU instance, he says.

"GPUs have a very parallel architecture with a lot of cores that makes parallel execution of many threads at once possible. And as brute-forcing/dictionary attacks are very straightforward to distribute, GPUs are perfectly suited for doing such jobs," Roth says.

By contrast, two high-end Intel X5570 Quad-Core CPUs can crack about 7,000 passwords per second, he says.

The catch, however, is that the passwords most at risk of this cloud-based hack are easily guessed, such as ones with all letters, all digits, or all same-case letters. Strong passwords, which use a mix of letters in mixed cases, numbers, and symbols, are relatively safe from this type of cloud attack, Roth says. "This demonstrates how fast easy passwords can be broken using modern technology ... If you're using only lowercase letters or just numbers, it's very easy and fast to crack your passwords," he says. "If you are using numbers and lower- and uppercase letters, it gets really hard. You can eventually crack them, but it takes a very long time. Brute-forcing is slow."

Roth says he used his CCS tool to break into (with permission) a neighbor's WPA-PSK wireless network via a password dictionary attack. "I was also able to brute-force the key of my new wireless router, which had a numeric digits-only password per default," Roth says. The tool can also be used to crack MD5-encrypted passwords, he says.

The CCS tool isn't the first cloud-based password-cracker, however. Researcher Moxie Marlinspike last year created the WPACracker service that tests the strength of passwords used in the encryption of wireless access points. Marlinspike says wpacracker.com already uses some GPUs in its processor cluster.

"So what's new [here] is that Amazon EC2 is now providing GPGPU instances, which can make these resources more accessible to people who don't want to maintain a machine with some Nvidia cards in it or who only occasionally have a job they'd like to run," Marlinspike says. "The unfortunate thing is that Amazon is only providing GPUs in their high-performance computing [HPC] instances. Most people who are doing HPC don't have problems that are as trivially 'parallelizable' as password-cracking, so they need 10-Gbps, full-bisection network connections between instances. This makes the GPU instances that Amazon is providing very expensive, at a whopping $2.10 an hour. Compare this against the 6 cents per hour for a high-CPU instance with five EC2 compute units in it."

So it's still cheaper to use CPUs to crack hashes with Amazon's EC2 service, he says, even though a GPU has faster performance. Marlinspike says his take on the research is based on what Roth has published thus far.

Roth, however, says he will publish new benchmarks next week that show that using GPUs is actually cheaper than using CPUs.

Meanwhile, continuing to use hash algorithms like SHA1 for storing passwords is risky, Roth says. "At first glance it seems to be pretty straightforward to use hash algorithms for storing passwords, as they are nonreversible. But the problem is that they are made to be very fast, as they are used to verify large pieces of data, which makes brute-forcing of them actually possible," he says.

A better option would be an algorithm like PBKDF2, which is actually slower and thus more protected from brute-force attacks, he says.

A spokesperson for Amazon Web services says Roth's research basically uses EC2 as a tool to demonstrate how network security can be improved. "Nothing in this researcher's work is predicated on the use of Amazon EC2. As researchers often do, he used EC2 as a tool to show how the security of some network configurations can be improved. Testing is an excellent use of AWS; however, it is a violation of our acceptable use policy to use our services to compromise the security of a network without authorization," the spokesperson said.

Using the CCS tool requires an EC2 subscription and incurs Amazon's cloud costs. The client side of the tool lets you configure and start up the encryption-cracking session. The CCS server tool runs on CentOS and is packaged in an Amazon machine image and handles the password-cracking.

"SHA1 was not made for storing passwords," he says. "I want people who are vulnerable using SHA1 for storing passwords to realize it's possible to boot up instances in the cloud, pay a few dollars per hour, and try to crack those."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web