A New Distributed Brute-Force Password Cracking Technique

  • Emanuel Tirado
  • Brendan Turpin
  • Cody Beltz
  • Phillip Roshon
  • Rylin Judge
  • Kanwal GagnejaEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 878)


In earlier incarnations of computing, security was not yet a concern. Now, because of the distribution of knowledge, malicious individuals have cleverly learned to take advantage of the loopholes. White hat hackers must constantly stay one step ahead of their black hat counterparts. When all other avenues of password cracking fail, brute force is the only option. Since the advent of secure hashing algorithms, passwords continue to become increasingly more difficult to crack. In this paper, we have presented an algorithm to crack passwords with brute force technique using parallel distribution. It is implemented on an IBM super computer to implement parallel distribution. It is a fact that with a distributed approach, diffusing intense computations across multiple nodes, millions of computations can be processed in a fraction of time.


Distributed brute-force MPI Password cracking Windows security NTLM hash security 


  1. 1.
    Cain and Abel. Platform MPI User’s Guide. IBM. 2012 MPI Communication Diagrams.
  2. 2.
    Du, X., Gagneja, K.K., Nygard, K.: Enhanced routing in heterogeneous sensor networks. In: IEEE Computation World 2009, Athens, Greece, pp. 569–574, 15–20 November 2009Google Scholar
  3. 3.
    Evanoff, L., Hatch, N., Gagneja, K.K.: Home network security: beginner vs advanced. In: ICWN, Las Vegas, USA, 27–30 July 2015Google Scholar
  4. 4.
    Gagneja, K.K., Nygard, K.: Heuristic clustering with secured routing in heterogeneous sensor networks. In: IEEE SECON, New Orleans, USA, pp. 9–16, 24–26 June 2013Google Scholar
  5. 5.
    Gagneja, K.K.: Secure communication scheme for wireless sensor networks to maintain anonymity. In: IEEE ICNC, Anaheim, California, USA, 16–19 February 2015Google Scholar
  6. 6.
    Gagneja, K.K.: Pairwise post deployment key management scheme for heterogeneous sensor networks. In: 13th IEEE WoWMoM 2012, San Francisco, California, USA, pp. 1–2, 25–28 June 2012Google Scholar
  7. 7.
    Gagneja, K.K.: Knowing the ransomware and building defense against it - specific to healthcare institutes. In: IEEE MobiSecServ, Miami, USA, 11–12 February 2017Google Scholar
  8. 8.
    Kanwal, G.: Pairwise key distribution scheme for two-tier sensor networks. In: IEEE ICNC, Honolulu, Hawaii, USA, pp. 1081–1086, 3–6 February 2014Google Scholar
  9. 9.
    Nygard, K., Gagneja, K.: Energy efficient approach with integrated key management scheme for wireless sensor networks. In: ACM MOBIHOC, Bangalore, India, pp. 13–18, 29 July 2013Google Scholar
  10. 10.
    Nygard, K., Gagneja, K.K.: Key management scheme for routing in clustered heterogeneous sensor networks. In: IEEE NTMS 2012, Security Track, Istanbul, Turkey, pp. 1–5, 7–10 May 2012Google Scholar
  11. 11.
    NTLM Algorithm: Openwall Community Wiki. 17 February 2010. Accessed 16 Mar 2017Google Scholar
  12. 12.
    Peleus: Ramblings. NetSec. Accessed 16 Mar 2017Google Scholar
  13. 13.
    Max, R., Gagneja K.K.: Raspberry Pi webserver. In: ESA, Las Vegas, USA, 27–30 July 2015Google Scholar
  14. 14.
    Arvinderpal, S., Gagneja, K.K.: Incident response through behavioral science: an industrial approach. In: IEEE CSCI, LasVegas, USA, 7–9 December 2015Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Computer Science and Information TechnologyFlorida Polytechnic UniversityLakelandUSA

Personalised recommendations