๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Data leaks result from malicious intent


Book ID
104392901
Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
65 KB
Volume
2011
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


The method builds on work carried out by Moxie Marlinspike and his WPACracker service, which uses a 400 CPU cluster on the Amazon cloud. Roth took this further using Amazon's 'cluster GPU instances' infrastructure.
Roth had previously carried out research using the Amazon service to brute-force SHA-1 hashes. As a result of the new Amazon service, he said, it's now easy for anyone to create a 100-node (or more) cluster and distribute the task of cracking passwords. It turns out that the job of cracking hashes is perfectly suited to mass parallelisation, he added.
With this architecture, he believes it's possible to try up to 400,000 passwords a second. He was able to break into a WPA-PSK protected network in around 20 minutes and believes this could be reduced to as little as six.
Roth's blog is at: .

Passwords not up to the task

T he humble password has had its day and is no longer up to the task of securing access to modern infrastructures and technologies, says a report from Forrester Consulting, commissioned by Symantec.


๐Ÿ“œ SIMILAR VOLUMES


Generating Results from Qualitative Data
โœ Ammon-Gaberson, Kathleen B. ;Piantanida, Maria ๐Ÿ“‚ Article ๐Ÿ“… 1988 ๐Ÿ› Wiley (Blackwell Publishing) ๐ŸŒ English โš– 570 KB
From microarray data to results
โœ Schlitt, Thomas; Kemmeren, Patrick ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Nature Publishing Group ๐ŸŒ English โš– 98 KB