| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document Help

Title:Implementacija in izvedba napadov ugibanja gesel na visoko zmogljivem računalniku
Authors:ID Škof, Aljaž (Author)
ID Hölbl, Marko (Mentor) More about this mentor... New window
ID Turkanović, Muhamed (Comentor)
Files:.pdf UN_Skof_Aljaz_2024.pdf (1,09 MB)
MD5: 1323677E6AEB5CCE671D585475371D16
 
.zip UN_Skof_Aljaz_2024.zip (691,64 KB)
MD5: B7C87424820275502A59C7867D5360A0
 
Language:Slovenian
Work type:Bachelor thesis/paper
Typology:2.11 - Undergraduate Thesis
Organization:FERI - Faculty of Electrical Engineering and Computer Science
Abstract:Vdori v sisteme dandanes postajajo vedno pogostejši pojav. Ukradena gesla so pogosto prodana na internetu. Pomembno je, da gesla s primernimi metodami zaščitimo. V diplomski nalogi predstavljamo različne metode shranjevanja gesel in napadov nanja z uporabo visoko zmogljivih računalnikov. Poglobimo se v napade na obliko shranjenih gesel, kot so napad z grobo silo, napad z masko, slovarski napad, Markove verige in napad z mavrično tabelo. Predstavimo in obrazložimo avtorski program, ki implementira napade in njegove optimizacije. Program poženemo na HPC-ju in predstavimo rezultate zagona. Z analizo performančnih testov ugotovimo, da lahko dosežemo hitrejše izvajanje programa z boljšim poznavanjem ogrodja MPI, saj so določeni klici v našem primeru časovno potratnejši kot pričakovano. Ozdivni čas MPI funkcij se po določenemu številu iteracij poveča za več kot $100000\%$. Z vsakim dodatnim grozdom se čas izvajanja še dodatno poveča. Implementacija je v hitrosti na enem CPU-ju primerljiva s Hashcat-om. Boljše obvladovanje knjižnice MPI doprinese k bistveno hitrejšemu izvajanju programa.
Keywords:HPC, gesla, brute-force, Rust, slovar
Place of publishing:Maribor
Year of publishing:2024
PID:20.500.12556/DKUM-88805 New window
Publication date in DKUM:01.07.2024
Views:124
Downloads:19
Metadata:XML RDF-CHPDL DC-XML DC-RDF
Categories:KTFMB - FERI
:
Copy citation
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-SA 4.0, Creative Commons Attribution-ShareAlike 4.0 International
Link:http://creativecommons.org/licenses/by-sa/4.0/
Description:This Creative Commons license is very similar to the regular Attribution license, but requires the release of all derivative works under this same license.
Licensing start date:27.05.2024

Secondary language

Language:English
Title:Implementation and execution of password guessing attacks on a high-performance computer
Abstract:System intrusions are becoming an increasingly common occurance. Stolen passwords can be found all over the web, so it's more important than ever to protect password database with sufficiently strong methods. In this thesis we list different effective and ineffective methods of password storage. Viable attacks against hashed passwords, such as brute-force, dictionary, mask attacks, Markov chain attacks and rainbow table attacks are presented. Some of the aforementioned attacks are implemented using Rust against the popular hashing function SHA-256. The program is compiled and ran on an HPC. It's performance and results are graphed and explained. Analysis of those results shows, that performance can be improved with a better understanding of MPI. Execution of MPI library calls was slower than expected. The execution time of these MPI calls increases by over $100000\%$. With each extra node the execution time further increases. We can reach an acceptable multi-node performance with this program by improving MPI performance, as it rivals Hashcat when run on a single node.
Keywords:HPC, password, brute-force, Rust, dictionary


Comments

Leave comment

You must log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica