John the Ripper 1.7.9-jumbo-6 , adds GPU support in New Release. John the Ripper 1.7.9-jumbo-6 Released earlier today.
This is a" Community-enhanced " version, which includes many contributions from JtRcommunity members. "John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. " The biggest newthing is integrated GPU support, both CUDA and OpenCL - although for a subset of the hash and non-hash types only, not for all that aresupported on CPU. Its speeds on Core i7-2600K 3.4 GHz (actually 3.5 GHz due to Turbo Boost) are: 1 thread: Benchmarking: Traditional DES [128/128 BS AVX-16]... Features Added Added optional parallelization of the MD5-based crypt(3) code with OpenMP.
Issue 151 - security-onion - NetworkMiner (requires Mono) - Security Onion is a Linux distro for IDS (Intrusion Detection) and NSM (Network Security Monitoring). Security Onion 20111020 now available! Password cracking, mining, and GPUs. People imagine that sophisticated hacking requires sophisticated computers.
The truth is that almost everything a hacker does can be done with a cheap notebook computer, or even a mobile phone. The major exception is password cracking, and related crypto tasks like bitcoin mining and certificate forgery. In these cases, a minor investment in hardware can be warranted. In particular, those who need to crack passwords (pen-testers, sysadmins, hackers) should buy a gaming graphics card in order to speed up cracking. Or, when buying notebooks for pen-testing, they should choose those with graphics processors. What’s a GPU Computers, as we know them, used to contain a single processor, called the central processing unit or CPU".
Now they contain a second processor, called the graphics processing unit or GPU. But GPUs aren’t just for graphics; they are good for any highly repetitive task. It’s important to keep in mind that graphics processors are no more powerful than central processors. Probably the Best Free Security List in the World. This article contains a comprehensive list of free security-related programs or web applications for Windows XP and later Windows PC-based operating systems.
The few non-free programs on this list are included because they are of high merit (in our opinion) and lack a comparable free alternative. This list also includes links to webpages that contain security-related information. We don't give specific recommendations on this list except for the personal suggestions of the list authors. If you are seeking recommendations then check out Gizmo's Freeware "Best Free" webpages (links to them are shown in the list with ) . We usually list a given item on this list only once, putting it where we think it best belongs. Google.
Network. Hacking. Bookmarks_Menu 1. Networking. Privacy. Python. Search. Snortsam. OpenX. Bookmarks_Menu 2. Bookmarks_Menu 3. Projects. For the last few years, while low-interaction (LI) honeypot systems like Nepenthes and PHoneyC are getting more and more powerful, the progress of high-interaction (HI) honeypot technology has been somewhat slower.
This is especially true for Sebek, the de-facto HI honeypot monitoring tool. Qebek is a QEMU based HI honeypot monitoring tool which aims at improving the invisibility of monitoring the attackers’ activities in HI honeypots. Qebek was developed by Chengyu Song during GSoc 2010. Our KYT paper on Qebek provides great detail on how to install and use Qebek. Its available at To obtain Qebek, check out its repository: svn co.