pvm brute force password cracker
this is a parallel brute force password cracker implemented in perl
the password cracker has not been optimized for speed rather than for testing purposes.
requirements
- pvm
- perl and Parallel::Pvm
download
---
pwcrack-0.3.tar.gz ---
pvm
the following steps are a quickstart on how to set up a pvm environment
-
setting up the pvm environment...
add the following lines to your bashrc with the appropriate paths
export PVM_ROOT=/usr/local/pvm3
export PVM_RSH=/usr/bin/ssh
export PVM_ARCH=`/usr/bin/pvmgetarch`
if you're using other non bash-compatible shells like tcsh these environment variables these variables must be set using different commands like set instead of export.
-
set up the ssh-agent.
-
installing...
pvm programs consists of at least two parts, slave programs doing the real work and a master program as a starting point and process management, which spawns all the slave programs. now copy the master program to your local pvm directory - by default ~/pvm3/bin/${PVM_ARCH}/ - and the slave programs to all your machines into the same directory.
-
starting the pvm console...
just type pvm, or better pvm hosts, where hosts is a pvm hosts file consisting of names/ips of pvm machines in each line.
after starting the pvm console check if all machines are connected: pvm> conf
new hosts can be added with add some.host.name
any password check at this point should be avoided by the ssh-agent.
-
testing...
to spawn a new master process, e.g. the pwcrack perl script, type
spawn -> pwcrack.pl 5 HlY4sPZiOwqRw
the -> redirects all output to the current standard output.
in the very rare case of a "file not found" or similar errors you should check for typos or add the local pvm path to your PATH environment variable in .bashrc or have a look at the sample hosts file below.
-
monitoring...
one of the easiest way of monitoring pvm processes is by using xpvm. this should, however, be started before the spawn.
example host file
* dx=$PVM_ROOT/lib/pvmd ep=$HOME/pvm3/bin/$PVM_ARCH
192.168.23.105
192.168.23.106
192.168.23.107
192.168.23.108
192.168.23.42
further reading
ssh setup (trivial ssh authorized key configuration)
tiny howto for setting up ssh with an ssh agent (with openssh)
-
create a ssh key pair - preferrably a ssh2 ssh key...
ssh-keygen -t dsa
-
add the public part of your ssh key - id_dsa.pub - to the authorized keys file - ~/.ssh/authorized_keys - of all machines you need access to
-
start the ssh agent...
ssh-agent bash or ssh-agent screen
-
add the key...
ssh-add ~/.ssh/id_dsa or just ssh-add
more information