Cracking wpa2 in the cloud by my-youtube-favourite.blogspot.com

720 views

Published on

It's a hard case investigation for the analyzer to crack it down this protocol authentication. Even a huge list of dictionary attack listing is involved, it's doesn't mean the successful will be achieve. Let's check it out!!!!

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
720
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Micro Instance 613 MB of memory, up to 2 ECUs (for short periodic bursts)Small Instance (Default) 1.7 GB of memory, 1 EC2 Compute Unit (1 virtual core with 1 EC2 Compute Unit)Large Instance 7.5 GB of memory, 4 EC2 Compute Units (2 virtual cores with 2 EC2 Compute Units each)High-CPU Medium Instance 1.7 GB of memory, 5 EC2 Compute Units (2 virtual cores with 2.5 EC2 Compute Units each)High-CPU Extra Large Instance 7 GB of memory, 20 EC2 Compute Units (8 virtual cores with 2.5 EC2 Compute Units each)
  • Cracking wpa2 in the cloud by my-youtube-favourite.blogspot.com

    1. 1. CRACKING WPA2-PSK IN THECLOUDA Cost Effective Solution For Brute Force AttacksBy Fotios Lindiakos and Ed Rowland
    2. 2. WPA2-PSKWi-Fi Protected Access II – Pre-shared Key Replaced WPA in 2004 as 802.11i standard  Added security replacing TKIP with CCMP (AES)  Required for devices with Wi-Fi trademark Two modes  Enterprise – requires a Radius Server (802.1x)  Personal – 256 bit key created from a string of 64 digits or 8-63 character passphrase Key calculation  Passphrase  PBKDF2(f) salted w/SSID  4096 iterations of HMAC-SHA1
    3. 3. WPA2-PSK/802-11i 4 Way Handshake • Goal - derive Passphrase from PMK • Correct Passphrase “guessed” if tool can calculate the same Message Integrity Code (MIC)Hacking Exposed - Stuart McClure, Joel Scambray, George Kurtz
    4. 4. Tools Used Amazon’s EC2 cloud  Multiple types of instances running 64 bit Ubuntu 10.04 LTS Aircrack-ng v1.1 Custom web front end Custom code to parallelize processing Laptop/mobile device running aircrack-ng to capture and send capture file to cloud
    5. 5. About The EC2 Cloud One of many proprietary web services Amazon offers providing PAAS, IAAS & SAAS Elastic Compute Cloud (EC2) virtualizes compute cycles into EC2 compute units (ECU) One ECU provides the equivalent CPU capacity of a 1.0-1.2 GHz 2007 Opteron or Xeon processor Access to an EC2 instance is via SSH leveraging PKI to encrypt a session key
    6. 6. To the cloud!
    7. 7. Cracking Statistics3500 $0.803000 $0.70 $0.602500 $0.502000 $0.401500 $0.301000 $0.20 $0.0888 $0.0944 $0.0833 500 $0.0455 $0.0585 $0.10 0 $- Micro (~2) Small (1) Large (4) Medium (5) X-Large (20) Instance Type (Number of ECUs) Key Rate (k/s) Cost ($/hr) Cost Per Million Keys
    8. 8. But what about cracking…One HundredMILLION keys!
    9. 9. Time to Crack 100,000,00030 $80.00 $70.0025 $60.0020 $50.0015 $40.00 $30.0010 $20.00 5 $10.00 0 $0.00 1 5 10 100 Number of Instances X-Large Time Medium Time Medium Cost X-Large Cost
    10. 10. Optimized for “Bang for your buck”35 $8.0030 $7.00 $6.0025 $5.0020 $4.0015 $3.0010 $2.00 5 $1.00 0 $0.00 0:50:00 1:50:00 Target Cracking Time X-Large Instances Medium Instances Medium Cost X-Large Cost
    11. 11. About Custom Code Written in Ruby  Front end is a Sinatra web application  Back end is a wrapper around aircrack-ng Library handles communicating with EC2 Only 234 lines of code
    12. 12. Front End Accepts PCAP from the user  Also gets SSID and how many instances to run Creates a “message” for each instance  This message is put on a queue waiting for client to come online  It contains all the information the client needs Starts cracking instances Waits for results and reports them to the user After a key is found, terminates all clients
    13. 13. Back End Pops a message off the queue at boot time Gets the PCAP and full dictionary file Creates smaller wordlists  First, makes a list based on “chunk” assigned  Breaks that into smaller chunks for reporting purposes Runs aircrack-ng against each chunk  Reports progress or the key after every iteration
    14. 14. Demo
    15. 15. Future Work Utilize other EC2 Instance types  High End Cluster with GPU  33.5 ECU and 2 x NVIDIA Tesla “Fermi” M2050 GPUs Optimize cracking client for architecture  Fully utilize multiple CPU/core  Fully utilize 64 bit capabilities  Fully utilize GPU acceleration Look at other cracking tools  coWPAtty, Hydra, custom code
    16. 16. Conclusion It’s certainly inexpensive and easy to leverage cloud computing to hack WPA2- PSK efficiently  As long as you have an adequate dictionary The attack can be prioritized based on  Cost  Use cheaper instances, regardless of time  Time  Use most powerful instances, regardless of cost

    ×