recovery of an account/system either hit by malware
or even in simple cases like when a user forgets
his/her password or during forensics.
There are many
different password cracking techniques like brute
forcing, dictionary based attacks, hybrid attack
which involves a combination of both brute forcing
and dictionary based attack, rainbow cracking
method for hash cracking and even through the use
of social engineering techniques (Rudy, Rodwald,
et al. , 2020), (Zion, 2018), (Shah, Patel, et al. ,
2020), (Shah and Jinwala, 2019) Some of the
existing popular password cracking tools
incorporate these techniques to provide flexibility
to the user while cracking a password.
Some of these
tools utilize system components like CPU and GPU
for effective password cracking. Even though with
such powerful tools sometimes it takes a very long
time to brute-force a password. Though one can
improve system configurations like allocating more
powerful CPUs, GPUs, RAM, storage etc but it then
increases the cost drastically. Some major pen-testing
organizations have a dedicated rig for password
cracking but other organizations, researchers or pen-
testers who would like to test a system against a
password cracking tool can’t simply afford such a rig.
Having a distributed password cracking tool in such
cases will aid in testing the system on the same level
as that of the rig but with minimum cost compared to
that of the rig. Utilizing processing power of other
hosts on the network will not only speed up the
process but it also means that every host will have a
lower load compared to when a single host utilizing
all its resources for the task of cracking a password
which will result in decrease of system performance
during other task done by user while the password
cracking task is running in background.
1.1 Our Contributions
We have reviewed some of the existing tools carried
out in the area of password cracking, which mostly
revolves around popular tools like Hashcat, John The
Ripper and THC Hydra, and distributed password
cracking, which involves tools like Fitcrack and
Hashtopolis. Based on the analysis of these tools, we
proposed a new light-weight command-line
distributed password cracking tool which covered
some of the flaws of the current password cracking
tools.
2 LITERATURE REVIEW
A review of work done in the area of password
cracking was carried out. It involves going through
some of the existing password cracking tools like
hashcat, JohnTheRipper and Hydra to learn about
their working, some of the novel techniques they use
to crack passwords and other features which make
them top choices for anyone in the cyber world in the
area of password cracking. Some of the existing
distributed password crackers like Hashtopolis and
Fitcrack have also been considered as part of the
literature review. Yisa et al. (Yu and Yin, 2021)
reviewed some of the top open-source password
cracking tools. The review paper starts with
discussing different forms of password authentication
and then the different types of password cracking
techniques like dictionary attacks, brute-force attack,
hybrid attack and rainbow tables. Later, for every
password cracking tool that was taken into
consideration, a brief overview and features were also
listed out. Some of the best practices for password
protection were also mentioned which includes the
use of salting for storing passwords, use of strong
passwords which are formed by combination of
capital letters, small letters, numbers and special
characters and the use of multi-factor authentication.
Pahuja and Sidana(Pahuja and Sidana, 2021)
compared different password cracking tools from an
implementation point of view. The authors
considered three tools for their study. Besides
considering pre-installed tools like Hashcat and John
The Ripper, they have also considered another tool
called Fcrackzip, which is different from other two,
as this one only focuses on zip password cracking.
John The Ripper and Hashcat mainly focuses on hash
cracking but the former could be used to crack zip
files with the help of additional tools like zip2john. A
comparative analysis of above mentioned tools was
also provided in a tabular form, which showed the
functionality/working of the tools as well as the
complexity associated with each of those tools.
Kakarla et al. (Kakarla, Mairaj, et al. , 2018)have
discussed a few password cracking tools with an
emphasis on THC Hydra. They started with first
discussing different pass- word cracking techniques
then proceeded to explain the technicalities of THC
Hybra by demonstrating attacks on FTP, SSH and
SMTP servers. Lastly, few protective measures that
are taken against password cracking were also
discussed. Hranicky` et al. (Hranicky`, Zobal, et al.
, 2019), in their paper, have first discussed the
need for dis- tributed password cracking. They used
the self-proclaimed fastest cracking tool, Hashcat, to