Cloud Computing Used to Hack Wireless Passwords by bestlaptopbattery.co.uk

German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses.
 
Jan. 11, 2011 - PRLog -- German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses.
Roth has created a program that runs on Amazon's Elastic Cloud Computing (EC2) system. It uses the massive computing power of EC2 to run through 400,000 possible passwords per second, a staggering amount, hitherto unheard of outside supercomputing circles--and very likely made possible because EC2 now allows graphics processing units (GPUs) to be used for computational tasks. Among other things, these are particularly suited to password cracking tasks.
In other words, this isn't a clever or elegant hack, and it doesn't rely on a flaw in wireless networking technology. Roth's software merely generates millions of passphrases, encrypts them, and sees if they allow access to the network.

However, employing the theoretically infinite resources of cloud computing to brute force a password is the clever part.

Purchasing the computers to run such a crack would cost tens of thousands of dollars, but Roth claims that a typical wireless password can be guessed by EC2 and his software in about six minutes. He proved this by hacking networks in the area where he lives. The type of EC2 computers used in the attack costs 28 cents per minute, so $1.68 is all it could take to lay open a wireless network.
Roth intends to make his software publicly available, and will soon present his research to the Black Hat conference in Washington, D.C.

Using EC2 for such ends would be against Amazon's terms of use, of course, but Reuters quotes Amazon spokesman Drew Herdener as saying that if Roth's tool is used merely for testing purposes, everything's above board.

Roth's intention is to show that wireless computing that relies on the pre-shared key (WPA-PSK) system for protection is fundamentally insecure. The WPA-PSK system is typically used by home users and smaller businesses, which lack the resources to invest in the more secure but complicated 802.1X authentication server system.
http://www.bestlaptopbattery.co.uk/hp/dv2000.htm
http://www.bestlaptopbattery.co.uk/dell/xps-m1730.htm

Read More:
http://iblog.at/bestlaptopbatteries/battery-tips-reuse-yo...

# # #

we offer rock bottom price on every electronic product showing on our website. No minimum quantity request! Tthe more discounts you will get! We also provide competitive prices for customers who regularly make orders or drop shipping.
End
Source: » Follow
Email:***@gmail.com Email Verified
Tags:Cloud Computing, Used To Hack Wireless Passwords, Bestlaptopbattery.co.uk, Laptop Batteries
Industry:Technology, Computers, Consumer
Location:Canada
Account Email Address Verified     Disclaimer     Report Abuse
superwholeshops News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share