Using Google Colab for Brute Force Attack
Image from: https://www.lynda.com/

Using Google Colab for Brute Force Attack

These days I was participating in a CTF Game that required me to use brute force to break the password of a WIFI network, however my computer doesn't have the capacity for this but first let's understand a bit about brute force attacks.

The brute force attack process can be performed in two ways:

1 - The attacker basically attempts various combinations of passwords until he finds one that works on some login system, either on websites or directly on servers.

2 - The attacker has access to the encrypted password (hash) and uses a dictionary, also known as wordlist, so it generates a hash and compares the two, if they are the same then it will know the password.

There are some softwares that do this work, THC Hydra is used in cases of remote authentication services such as login areas in websites, John The Ripper and Hashcat can do hash attacks offline.

Google Colab is a free cloud service for AI developers. With Colab, you can develop deep learning applications on the GPU for free, but every 12 hours the machine is deleted and you have to configure a new instance.

I decided to join Hashcat with Google Colab to do the password cracking and so I gained considerable performance because of the NVIDIA Corporation GK210GL [Tesla K80] 12 GB provided by Google. The installation is very simple, I left the commands available below:

Go to https://colab.research.google.com/ and create a "New Python 2 Notebook" environment, then go to "Runtime" and click "Change runtime type" and select "GPU".

Installing Hashcat

Send the following command to install hashcat:

!apt install cmake build-essential -y && apt install checkinstall git -y && git clone https://github.com/hashcat/hashcat.git && cd hashcat && git submodule update --init && make && make install

Once the hashcat is installed, just use it as if it were in your machine.

NOTE: To use linux commands, you should put an exclamation mark. Ex: !whoami

To protect yourself from this type of attack follow the recommendations, don't use an easy password, use special characters, numbers, uppercase and lowercase letters in your password, if possible use two-factor authentication.

Use your imagination to use the machine any way you want.

Hey Edvan Oliveira, I tried installing through your commands, but on executing hashcat, I get the following error hashcat (v5.1.0-1197-ge65b6fb4+) starting... Outdated NVIDIA CUDA Toolkit version '10000' detected! See hashcat.net for officially supported NVIDIA CUDA Toolkit versions. Started: Thu Jul 4 09:35:56 2019 Stopped: Thu Jul 4 09:35:56 2019 Did you also face something similar? If yes then how did you resolved it?

To view or add a comment, sign in

More articles by Edvan Oliveira

  • Be careful with your data(base)

    I am a big lover of search engines like Shodan, Censys and Zoomeye, many of the tools that I develop are using their…

    2 Comments
  • Falha de segurança no EasyTaxi

    No dia 04/09/2018 reportei uma falha de segurança à equipe do EasyTaxi e hoje, alguns meses depois, decidi explicar…

    2 Comments
  • Bypassing WAFs with Search Engines using dorks

    The use of cloud-based services has become constant in recent years by the cost of maintenance, for example. With the…

  • Por que devo evitar Free WiFi Zone?

    Quantos de nós já não nos vimos em uma situação que precisamos de internet em uma localidade com 3g/4g ruim e a única…

    2 Comments
  • Você acredita em privacidade?

    Somos cercados de tecnologias todos os dias e você pode parar para pensar em privacidade cada vez que olhar para cada…

  • Ransomware, seus dados podem ser sequestrados

    O Ransomware é um malware responsável por sequestrar os dados de dispositivos e pedir recompensa geralmente em…

    2 Comments

Others also viewed

Explore content categories