PDA

View Full Version : Dcrack - distributed wireless password cracking



zircanavo_abyss
03-18-2014, 11:53 AM
Hello guys,

With the New Update from Aircrack-Suite, its now possible to use others system for the processing power.
(i know that CPU cracking is an old school technique but this tool is really fun :P)
with the new tool introduced in the aircrack suite, dcrack has the ability to perform Wireless Password Cracking in a Distributed Computing Environment. Isn't its COOL !! :D

ok then lets see how can we work on dcrack. (i just tired it now but i think its an AWESOME tool !! )



Note: I did not test this in a Fully Functioning Lab, I did the testing on VMware Workstation with 4 OS Running ( 1 User, 1 Server, 2 Clients).




STEP 1 - INSTALL AIRCRACK SUITE

Just refer to the aircrack website (http://www.aircrack-ng.org/install.html) for this.


STEP 2 - RUN DCRACK

To run dcrack, you need to know the working of dcrack.

http://3.bp.blogspot.com/-W40rd3Yh4Zo/UeapM6tQBTI/AAAAAAAAAUA/JBHpgq9sYNk/s1600/dcrack.png

As we know now that dcrack utilizes the concept of Distributed Computing, so dcrack need three things :


A User

The User requests the server to crack the wireless password for him/her. The user will send the ".cap" file and a dictionary file (wordlist) to the server for cracking.



A Server

The server will be used as a Command Center. All the instructions, related to cracking will be given from here. The server will process the user's request for cracking and pass the instructions to the Clients.



Clients

Clients are responsible for do the dirty work !!
they use their processing power to crack the password using the wordlist given by the User.



To run dcrack, we need to go to the location where dcrack is located. so now in the terminal we'll go to :
/pentest/wireless/aircrack-ng/scripts/

First, the server needs to be start. Run the below given command to start the dcrack server.

python dcrack.py server

http://4.bp.blogspot.com/-12a0Xz773_4/Ueaw2FibwCI/AAAAAAAAAUQ/t0mcCF3leWw/s1600/dcrack-server.png

-------------------------------------------------

NOTE:



DCRACK SERVER IP : 192.168.1.128

CLIENT 1 IP: 192.168.1.131
CLIENT 2 IP: 192.168.1.133
USER IP : 192.168.1.132
MAC ADDR OF THE AP : 00:0d:93:eb:b0:8c
-----------------------------------------------------------



Second, the user needs to send the .cap file and the wordlist for the cracking to the server.

python dcrack.py cmd 192.168.1.128 cap /root/test.cap
python dcrack.py cmd 192.168.1.128 dict /root/password.lst

http://4.bp.blogspot.com/-n3L3eRVIinA/UebHTkGvzvI/AAAAAAAAAV8/DOlPOCe_TRE/s1600/dcrack-user.png

USER LOG ON SERVER (user sending the files to the server)

http://3.bp.blogspot.com/-y7--NV5aZRk/UebHR4qrGXI/AAAAAAAAAVo/6PeXcwsfKA4/s1600/dcrack-server-user.png

NOTE: The wordlist and the .cap file are compressed first to reduce the size to send it over the network.

Third, Both the clients (CLIENT 1 and CLIENT 2) needs to tell the server that its available for cracking.

python dcrack.py client 192.168.1.128


CLIENT 1

http://4.bp.blogspot.com/-pyjoskyWAHI/UebHPOuO4oI/AAAAAAAAAU4/QJEFHn_RSwI/s1600/dcrack-server-client-1.png

CLIENT 1 LOG ON SERVER

http://3.bp.blogspot.com/-302AUGnuEuE/UebHOZA-9HI/AAAAAAAAAUk/5BPnT8LMJig/s1600/dcrack-server-client-1-log.png

CLIENT 2

http://2.bp.blogspot.com/-BVXzJD2Jsdo/UebHQp5HDPI/AAAAAAAAAVM/Agx2cC0SpNc/s1600/dcrack-server-client-2.png

CLIENT 2 LOG ON SERVER

http://1.bp.blogspot.com/-SKlRJGYJw5E/UebHQrLCZyI/AAAAAAAAAVI/DUXck1oMAMQ/s1600/dcrack-server-client-2-log.png

Now, the user needs to send the cracking request to the server

python dcrack.py cmd 192.168.1.128 crack 00:0d:93:eb:b0:8c

USER LOG ON SERVER

http://1.bp.blogspot.com/-XT9-vYkCO-E/UebHR8LxHlI/AAAAAAAAAVg/TsnP6mONxSQ/s1600/dcrack-user-crack-log.png

Once the user requests the server for cracking, the Clients will start downloading the wordlist and the .cap file from the server. Clients then uncompresses the files and then Splits the Wordlist in 2 parts (as we have 2 clients here) and then starts the cracking using their computing power.

zircanavo_abyss
03-18-2014, 11:55 AM
CLIENT 1

http://1.bp.blogspot.com/-ZD3VNKIwqKk/UebHOzS0jOI/AAAAAAAAAUw/EazglpExrAM/s1600/dcrack-server-client-1-cracking.png

CLIENT 2

http://4.bp.blogspot.com/-kTa-3hMOoSs/UebHPbuU-AI/AAAAAAAAAU8/nvfVKt9ogek/s1600/dcrack-server-client-2-cracking.png

CLIENT 1 LOG ON SERVER (Client sending the password to the server)

http://1.bp.blogspot.com/--zGnWxFHgf0/UebHShYBiZI/AAAAAAAAAVw/g7p7w7gfmAo/s1600/dcrack-user-status-log.png

as you all can see above, CLIENT 1 found the key from the wordlist.


The user can check the status of the cracking using the below command :


python dcrack.py cmd 192.168.1.128 status

http://1.bp.blogspot.com/-Bb4jfhtl-BM/UebHS0ZkZdI/AAAAAAAAAV0/6HD5Koygtvw/s1600/dcrack-user-status.png


Phew !!
Too Long ... ha ha :D

That's all guys... i hope you like it.

AnArKI
03-18-2014, 10:19 PM
Welcome to g4h zircanavo_abyss... thanks for the posts, you can also make use of the blog section to start your own series of blogs.

[s]
03-19-2014, 01:18 PM
Perfect explanation, I've suggested this post one of few friends who are actually looking for this kind of article :D Keep posting \m/