![]() Once the AWS instance is setup, what kind of stats do we get out of this demon? Here's the result of hashcat -b: Hashmode: 0 - MD5 Also, our buddy Joe pointed me towards a utility called duplicut to help de-dupe large password-cracking wordlists. If you need help installing one of my fave tools, hatecrack check out my password cracking in the cloud gist. We think AWS sometimes refreshes the drivers or something and hashcat doesn't like it very much. Awallet cloud crack install#If you ever turn your cracker off and get errors running hashcat when you turn it back on, re-run the install line. Pro tip: Save the Cuda download somewhere. Luckily, the article addresses that with this great tip: The steps are pretty straightforward, but between reboots I found that hashcat acted all wonky. WARNING: running this instance is super expensive (the author warns the instance would cost ~$9k/month if you left it run continuously). The article (complemented by a sweet video) will get you running in short order. Well, in today's episode I talk about this article from Sevnx which walks you through building a virtual password-cracking beast in the cloud. ![]() ![]() Unfortunately, this week, Hashy (the name I gave to the rig) is overheating, and GPUs are impossible to find, so what's a pentester to do? One reason we haven't talked about password cracking in the cloud in a while is because back in winter of 2019 I built baby's first password cracking. Hey friends! Today we're dusting off an old mini-series about password cracking in the cloud (check out part 1 and part 2) and sharing some awesome info on building a monster of a cracking rig in AWS! ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |