7 CONCLUSION
The basic method of password recovery is an exhaus-
tive search. Despite a huge number of all permuta-
tions, currently available hardware and the strength of
common passwords make this method still relevant.
With the support of high-end GPUs, the password
recovery process can be performed in a fraction of
time in comparison with CPU-only computation. In
the area of password recovery, there is also a lot of
space for parallelization and the scalability potential
of the process is high.
In the future, we want to focus mainly on pass-
word recovery in distributed environment. We also
plan to extend Wrathion with modules for another file
formats, and with more sophisticated password gen-
erators. Finally, we want to compare our tool with
another software, e.g. AccessData Password Recov-
ery Toolkit
14
.
ACKNOWLEDGEMENTS
Research presented in this paper is supported by
project ”Modern Tools for Detection and Mitigation
of Cyber Criminality on the New Generation Inter-
net”, no. VG20102015022 granted by Ministry of
the Interior of the Czech Republic and a project ”Re-
search and application of advanced methods in ICT”,
no. FIT-S-14-2299 granted by Brno University of
Technology.
REFERENCES
Adobe Systems Incorporated (2008a). Adobe Supplement
to the ISO 32000, BaseVersion: 1.7, ExtensionLevel:
3. Adobe Systems Incorporated.
Adobe Systems Incorporated (2008b). Document manage-
ment Portable document format Part 1: PDF 1.7.
Number 32000-1:2008. International Organization for
Standardization, Geneva, Switzerland.
Advanced Micro Devices Inc. (2010). Introduction to
OpenCL programming - Training guide. Number 137-
41768-10. Advanced Micro Devices Inc.
Al-Wehaibi, K., Storer, T., and Glisson, W. B. (2011).
Augmenting password recovery with online profiling.
Digit. Investig, 8:S25–S33.
An, X., Zhao, H., Ding, L., Fan, Z., and Wang, H. (2015).
Optimized password recovery for encrypted RAR on
GPUs. CoRR.
Apostal, D., Foerster, K., Chatterjee, A., and Desell, T.
(2012). Password recovery using MPI and CUDA. In
Proc. of HiPS 2012, pages 1–9.
14
http://accessdata.com
Bergen, H. A. and Caelli, W. J. (1990). File Security in
WordPerfect 5.0.
Emam, K. E., Moreau, K., and Jonker, E. (2011). How
strong are passwords used to protect personal health
information in clinical trials? Journal of Medical In-
ternet Research, 13(1).
Flor
ˆ
encio, D. and Herley, C. (2007). A large-scale study of
web password habits. In Proc. of the 16th Int. Confer-
ence on WWW, pages 657–666.
Flor
ˆ
encio, D., Herley, C., and Oorschot, P. C. V. (2014). An
Administrator’s Guide to Internet Password Research.
In Proceedings of the 28th USENIX Conference on
Large Installation System Administration, LISA’14,
pages 35–52. USENIX Association.
Marks, M. and Niewiadomska-Szynkiewicz, E. (2014). Hy-
brid cpu/gpu platform for high performance comput-
ing. In Proc. of the 28th ECMS, pages 523–537.
Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L.,
Christin, N., Cranor, L. F., Kelley, P. G., Shay, R., and
Ur, B. (2013). Measuring Password Guessability for
an Entire University. In Proceedings of the 2013 ACM
SIGSAC Conference on Computer & Communications
Security, CCS ’13, pages 173–186. ACM.
NVIDIA Corporation (2012). NVIDIA CUDA C Program-
ming Guide. NVIDIA Corporation.
Thing, V. L. and Ying, H.-M. (2003). Making a faster crypt-
analytic time-memory trade-off. Advances in Cryptol-
ogy, pages 617–630.
Weir, M., Aggarwal, S., de Medeiros, B., and Glodek,
B. (2009). Password Cracking Using Probabilistic
Context-Free Grammars. In Security and Privacy,
2009 30th IEEE Symposium on, pages 391–405.
Wu, H. (2005). The misuse of rc4 in microsoft word and
excel.
Yampolskiy, R. (2006). Analyzing user password selection
behavior for reduction of password space. In Car-
nahan Conferences Security Technology, Proceedings
2006 40th Annual IEEE International, pages 109–
115.
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
306