Skip to content

Ethical Distributed Password Cracker using Dictionary Attack and Brute Force

License

Notifications You must be signed in to change notification settings

YashsviG/distributed-password-cracker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Distributed Password Cracker - Dictionary Attack/Brute Force

Ethical Distributed Password Cracker

The password cracker aims to crack passwords created using hashing algorithms:

  1. Yescrypt
  2. MD5crypt
  3. SHA1crypt
  4. SHA256crypt
  5. SHA512crypt
  6. Bcrypt
  7. DEScrypt

High Level Client-Server Architecture

image

User Guide

Pre requisite:

  • Need to have python setup on the machine.
  • A shadow file to test with.
  • Some file(s) containing top passwords (dictionary of passwords).
  1. Run the password cracker Server: python3 server.py -f /etc/shadow -t <#> <username>:
          image

  2. Run the password cracker Client: python3 main.py -s <ip-address-server> -p <port>
          - The list of the top password text file is provided in the source directory.
          - Can run it on a custom port which is different from the default one:
              Screen Shot 2023-05-05 at 9 56 51 AM

  3. There has been a copy of shadow file provided in source directory as well for reference. You can add some user-password lines here in this file manually and pass this to the -f flag when initiating the program instead of the /etc/shadow.

Example Password Cracked

image image

Releases

No releases published

Packages

No packages published

Languages