Results 1 to 6 of 6

Thread: Distributed Brute Force For Backtrack 5

  1. #1
    Join Date
    May 2011
    Posts
    220

    Distributed Brute Force For Backtrack 5

    Well, he mentions that the cost would still be a difficulty, although it had a number of hardware fork opening. This got me philosophy. Why not build a WPA Brute force (or even brute force, in common) of the distributed computing project. I believe it would be enhanced not to focus on WPA only (mostly since there is an incurable mistake in TKIP I've been looking at persons who wonder why tkiptun-ng does not work, I can assist), would be particularly pleasant if we could construct a resourceful platform that will be capable to carry out a series of attacks by brute force.

    Distributed computing harnesses million computers volunteers as a parallel supercomputer. This means that we would require a eager audience. To assist with this, I'm thoughts the client uses intended for an assault would need has by now donated amazing like 24 hours of GPU / CPU time. a lot of people with small servers could add a virtual machine for handling additional voluntary would be fine. Someone needs to run a centralized server, which would be willing to sink a bit more "once-only" money.

  2. #2
    Join Date
    Nov 2009
    Posts
    758

    Re: Distributed Brute Force For Backtrack 5

    Other than "for the reason that we can" and "trend" I do not see the point of such a system. Companies really should not be using WPA, you should use some sort of server stations. If an important person is using a distributed system, or further group on the technique to break the home network, in attendance there are enhanced possessions to be concerned on the subject of.This project is really a good start for all those need to know about brute force

  3. #3
    Join Date
    Apr 2009
    Posts
    970

    Re: Distributed Brute Force For Backtrack 5

    I'm not a big fan of helping people to spy on their neighbors. You may also want to think about the consequences of not expressive who Cap the file they are taking and can be called to your door. It's a good suggestion, nevertheless that's where it ends. Sorry. Through the way - to break into someone's network and spy on their staff is similar to the evil that looks creepy in people’s windows at night. It’s strange.

  4. #4
    Join Date
    Apr 2009
    Posts
    994

    Re: Distributed Brute Force For Backtrack 5

    I agree 100%. This tool would be developed in support of authorized penetration tests. Established, it would incontestably take delivery of lots of traffic from others abusing the tool, immediately like each pen testing tool included in Backtrack. Each and every individual saying that, your position is well completed linked with each brute force tool in Backtrack 5. It is unable to nullify the development of a dissimilar one.

  5. #5
    Join Date
    May 2008
    Posts
    2,680

    Re: Distributed Brute Force For Backtrack 5

    My argument was not against the tool itself (for the reason that I like the thought). Against the fact that someone is using the tool on my computer that bothers me. I know what my system tools are doing. I would have no control over this setting and do not think the benefit (cracks quickly) is worth the risk to me or that could potentially harm the public. I understand - there is always someone to abuse a system, but they're not going to do with my team if I can help.

  6. #6
    Join Date
    Apr 2010
    Posts
    71

    Re: Distributed Brute Force For Backtrack 5

    Get an important person to show that they are using the service illegitimately is almost certainly the biggest difficulty I encountered while working on my project. The only reasonable solution I got was my original "trusted only" scheme that allowed only to respected members of a group's credibility or to upload files cracks, i.e. reversing the forum members with a post count minimal. The second biggest problem I encountered while pursuing the idea of cracks distributed the lack of bandwidth, the sending and delivery of such quantity of information is a enormous saddle, still in most of the LAN at home, and much less over the Internet. I have a contact willing to provide server space and a large portion of bandwidth, but obviously if the project gets bigger and we are more than 20 people constantly contributing to the CPU a much more expensive will be required. Projects such as home is probable to donated possessions of bandwidth and a lot of great companies that obtain tax credits and good PR out of it, no one will want to put there the name of a cracking service. I do not think we should be looking at these problems as a reason to stop trying, but as obstacles to be overcome.

Similar Threads

  1. Replies: 7
    Last Post: 17-11-2011, 11:13 AM
  2. Do firmware update for Force Series 3 and Force GT is available?
    By Nitesha in forum Hardware Peripherals
    Replies: 6
    Last Post: 25-09-2011, 08:33 AM
  3. Achron Packages for Linux is distributed as .deb
    By Where-TO in forum Video Games
    Replies: 7
    Last Post: 03-09-2011, 12:00 PM
  4. Motorola Brute i686 Features and Specification
    By Cordaro in forum Portable Devices
    Replies: 3
    Last Post: 09-02-2011, 07:24 PM
  5. Guide me about Motorola Brute i680 (Sprint)
    By Mumtaz86 in forum Portable Devices
    Replies: 4
    Last Post: 11-02-2010, 04:23 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,714,052,248.98157 seconds with 17 queries