SlideShare a Scribd company logo
White Chapel
Password Auditing Framework
Current State of Password Cracking
1.   Get hashes
2.   Crack hashes!! With GPUs!!
3.   ...
4.   Profit!




                  Ok... and then what...
Intro to White Chapel
The 'dark side' to Password
Cracking

● Dump/Cracked are either deleted or left
  scattered around the cracking box

● Clear-text passwords never make it to
  password cracking box for addition to
  dictionaries (don't need to be cracked)

● Each team member uses their own methods,
  tools, and dictionaries
The 'dark side' to Password
Cracking - cont'd

● Running the same dictionary over and over
  is a waste of computer time

● Cross-hash knowledge is that golden nugget
  that gets forgotten
  ○ Password "P#$$w0rd1259_%" cracked because LM
    stored, isn't checked against MySQL hash and goes
    uncracked because hash type is unrealistic to brute
    to 14 characters
But why not use one of the online
hash databases?
          ● No way I'm going on
            unemployment for divulging
            internal passwords to a 3rd
            party.
          ● For the most part they don't
            allow upload of files ( pwdump /
            shadow / dictionary ) to do mass
            lookups/adds
          ● Not open source. I don't know
            what or where the things I'm
            looking up go
What about #{hash_cracking_tool}
● WhiteChapel doesn't try to replace or do
  cracking better, John The Ripper and
  Hashcat have teams and community
  support.
  ○ Not to mention WAY better at math than me
● WhiteChapel should just be your first (check
  for any known passwords instantly) and last
  (import all of your known passwords) stop on
  the password cracking train
Enter White Chapel
 my solution to those issues
White Chapel 0.1
White Chapel 1.0
Problem 1: No centralized storage
● WhiteChapel uses ElasticSearch as a
  backend "database" of passwords and
  hashes
Problem 2: Clear-Text Passwords
● WhiteChapel allows you to
  input either dictionaries or
  single passwords through
  an easy to use web
  interface
Problem 3: No team collaboration
● WhiteChapel utilizes a centralized, yet easily
  clustered Elastic Search backend.
● Joe imports their dictionary
● Alice adds the 20 character password they
  found in a text file
● Joe finds a MySQL hash that matches that
  20 character password
● Alice finds 20 extra passwords using
  WhiteChapel's mass-lookup due to Joe's
  dictionary contribution
Problem 4: Re-running same
dictionary
● WhiteChapel enables upload of pwdump and
  hashlist files, this allows for near instant
  searching of hashes stored in whitechapel,
  no matter the hash type's cracking speed
● Since ElasticSearch can easily handle
  billions of what it calls "documents", this can
  out-pace standard cracking tools
Problem 5: Cross-hash knowledge
● Since WhiteChapel generates all of the
  supported hash types for all of the
  passwords inputted, finding where users
  have re-used passwords can result in new
  findings
● This is mostly useful beyond the threshold of
  standard brute-force lengths (passwords
  over 10 characters) and saves you time
  processing a "found pass" dictionary.
Installation & Startup
Installation Steps (Dependencies)
1. Ruby
2. ElasticSearch
  a. Download then run ./bin/elasticsearch -f
  b. Requires Java or OpenJDK
  c. http://www.elasticsearch.org/download/
3. Redis Server
  a. Download then run ./redis-server --foreground
  b. http://redis.io/download


Both of those options are foreground
running, works in screen, but each OS has
service based options
Installation Steps
1. git clone repo
   a. edit elastic.conf for elasticsearch ip/port if different
   b. edit Rakefile for redis ip/port if different
2. bundle install (to pull ruby gems)
Start the app, queue system and one
worker

          1. foreman start
Expanding...
● Start more elasticsearch servers
  ○ elasticsearch/bin/elasticsearch -f
● Start more redis servers
  ○ redis/redis-server --foreground
● Start more redis-resque workers
  ○ ./scripts/start_worker.sh
● Start another Sinatra front-end
  ○ ruby app.rb
Infrastructure
Single-box Setup

                                     Sin
                                        atr
                                           aq

                               e
                              eu
                                              ue
                          qu                     ries
                                                        ela
                          o

                                                           sti
                     st


                                                                 cs
                                                                    e
                     rd



                                                                     arc
                   wo




                                                                        h
                ss
              pa
           ds
         ad
     tra




                                                                                        m
    na




                                                                                     fro rch
    Si




                                                                                  es a
                                                                                sh ticse
                                                                              ha s
                                                                           es ela
                                                                        rat o
                                                                      ne s int
                                                                    ge d
              Redis worke
                          rp                                   rk er fee
              passwords fr ulls                              wo and
                          om queue                        is    d
                                                       ed wor
                                                      R ss
                                                       pa
Scaled Setup
Uber - Scaled Setup
end
http://github.com/mubix/whitechapel

More Related Content

PDF
Attacker Ghost Stories - ShmooCon 2014
PDF
Ce Hv6 Module 18 Web Based Password Cracking Techniques
PDF
Ceh v5 module 13 web based password cracking techniques
PPTX
Ethical Hacking
PPTX
password cracking and Key logger
PPTX
Password craking techniques
PPTX
Password Cracking
PPT
Listings Update
Attacker Ghost Stories - ShmooCon 2014
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Ceh v5 module 13 web based password cracking techniques
Ethical Hacking
password cracking and Key logger
Password craking techniques
Password Cracking
Listings Update

Viewers also liked (20)

PDF
From idea to exit
PPT
Cascao&Conway Stockholm Doube Faced Cooperation Nile Basin
PPS
PPTX
Awebowey!!! Agosto2009
PPS
Animo3
PPT
Cascao Arava Hydropolitical Cooperation Nile Basin
PPT
Evolving a strategy.. Madan Padaki Nasscom Emerge Conference 29 Sept08
PPT
PPT
Classification Station
PPS
Profession
PPS
Corporate Lessons
PPT
Sponges&Cnidarians 08
PPT
My Chemical Romance
PPT
Bingo Numbers
PDF
The Changing Landscape of Public Relations
PPT
Cascao London Resisting Hegemony Nile Basin
PPT
AEGIS Conference of African Studies 2011 - Uppsala [The Nile River Basin: in ...
PPS
10 Roses
PPT
PP pechicutcha Mart van Koolwijk
PPT
Evaluating of an education program
From idea to exit
Cascao&Conway Stockholm Doube Faced Cooperation Nile Basin
Awebowey!!! Agosto2009
Animo3
Cascao Arava Hydropolitical Cooperation Nile Basin
Evolving a strategy.. Madan Padaki Nasscom Emerge Conference 29 Sept08
Classification Station
Profession
Corporate Lessons
Sponges&Cnidarians 08
My Chemical Romance
Bingo Numbers
The Changing Landscape of Public Relations
Cascao London Resisting Hegemony Nile Basin
AEGIS Conference of African Studies 2011 - Uppsala [The Nile River Basin: in ...
10 Roses
PP pechicutcha Mart van Koolwijk
Evaluating of an education program
Ad

More from Rob Fuller (16)

PDF
Why isn't infosec working? Did you turn it off and back on again?
PPTX
KiwiCon 2016 - Kicking Orion's Assets
PDF
Writing malware while the blue team is staring at you
PDF
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
PPT
GiTFO
PDF
NotaCon 2011 - Networking for Pentesters
PPTX
As The Phish Turns
PPT
RIT 2009 Intellectual Pwnership
PDF
Metasploit magic the dark coners of the framework
PDF
Windows Attacks AT is the new black
PDF
Practical Exploitation - Webappy Style
PPTX
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
PDF
A @textfiles approach to gathering the world's DNS
PPTX
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
KEY
Memory Forensics for Pentesters: Firefox
PPTX
From Couch To Career In 80 Hours
Why isn't infosec working? Did you turn it off and back on again?
KiwiCon 2016 - Kicking Orion's Assets
Writing malware while the blue team is staring at you
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
GiTFO
NotaCon 2011 - Networking for Pentesters
As The Phish Turns
RIT 2009 Intellectual Pwnership
Metasploit magic the dark coners of the framework
Windows Attacks AT is the new black
Practical Exploitation - Webappy Style
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
A @textfiles approach to gathering the world's DNS
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Memory Forensics for Pentesters: Firefox
From Couch To Career In 80 Hours
Ad

Intro to White Chapel

  • 2. Current State of Password Cracking 1. Get hashes 2. Crack hashes!! With GPUs!! 3. ... 4. Profit! Ok... and then what...
  • 4. The 'dark side' to Password Cracking ● Dump/Cracked are either deleted or left scattered around the cracking box ● Clear-text passwords never make it to password cracking box for addition to dictionaries (don't need to be cracked) ● Each team member uses their own methods, tools, and dictionaries
  • 5. The 'dark side' to Password Cracking - cont'd ● Running the same dictionary over and over is a waste of computer time ● Cross-hash knowledge is that golden nugget that gets forgotten ○ Password "P#$$w0rd1259_%" cracked because LM stored, isn't checked against MySQL hash and goes uncracked because hash type is unrealistic to brute to 14 characters
  • 6. But why not use one of the online hash databases? ● No way I'm going on unemployment for divulging internal passwords to a 3rd party. ● For the most part they don't allow upload of files ( pwdump / shadow / dictionary ) to do mass lookups/adds ● Not open source. I don't know what or where the things I'm looking up go
  • 7. What about #{hash_cracking_tool} ● WhiteChapel doesn't try to replace or do cracking better, John The Ripper and Hashcat have teams and community support. ○ Not to mention WAY better at math than me ● WhiteChapel should just be your first (check for any known passwords instantly) and last (import all of your known passwords) stop on the password cracking train
  • 8. Enter White Chapel my solution to those issues
  • 11. Problem 1: No centralized storage ● WhiteChapel uses ElasticSearch as a backend "database" of passwords and hashes
  • 12. Problem 2: Clear-Text Passwords ● WhiteChapel allows you to input either dictionaries or single passwords through an easy to use web interface
  • 13. Problem 3: No team collaboration ● WhiteChapel utilizes a centralized, yet easily clustered Elastic Search backend. ● Joe imports their dictionary ● Alice adds the 20 character password they found in a text file ● Joe finds a MySQL hash that matches that 20 character password ● Alice finds 20 extra passwords using WhiteChapel's mass-lookup due to Joe's dictionary contribution
  • 14. Problem 4: Re-running same dictionary ● WhiteChapel enables upload of pwdump and hashlist files, this allows for near instant searching of hashes stored in whitechapel, no matter the hash type's cracking speed ● Since ElasticSearch can easily handle billions of what it calls "documents", this can out-pace standard cracking tools
  • 15. Problem 5: Cross-hash knowledge ● Since WhiteChapel generates all of the supported hash types for all of the passwords inputted, finding where users have re-used passwords can result in new findings ● This is mostly useful beyond the threshold of standard brute-force lengths (passwords over 10 characters) and saves you time processing a "found pass" dictionary.
  • 17. Installation Steps (Dependencies) 1. Ruby 2. ElasticSearch a. Download then run ./bin/elasticsearch -f b. Requires Java or OpenJDK c. http://www.elasticsearch.org/download/ 3. Redis Server a. Download then run ./redis-server --foreground b. http://redis.io/download Both of those options are foreground running, works in screen, but each OS has service based options
  • 18. Installation Steps 1. git clone repo a. edit elastic.conf for elasticsearch ip/port if different b. edit Rakefile for redis ip/port if different 2. bundle install (to pull ruby gems)
  • 19. Start the app, queue system and one worker 1. foreman start
  • 20. Expanding... ● Start more elasticsearch servers ○ elasticsearch/bin/elasticsearch -f ● Start more redis servers ○ redis/redis-server --foreground ● Start more redis-resque workers ○ ./scripts/start_worker.sh ● Start another Sinatra front-end ○ ruby app.rb
  • 22. Single-box Setup Sin atr aq e eu ue qu ries ela o sti st cs e rd arc wo h ss pa ds ad tra m na fro rch Si es a sh ticse ha s es ela rat o ne s int ge d Redis worke rp rk er fee passwords fr ulls wo and om queue is d ed wor R ss pa
  • 24. Uber - Scaled Setup