photo lineviral_1.png

How To Benchmark Pyrit

This is a brusk conduct on How to benchmark Pyrit


Assuming you lot managed to setup CUDA as well as Pyrit correctly, deed on to the code section.


If not, become dorsum as well as follow this guide: How to Install Nvidia Kernel Module Cuda as well as Pyrit


This is a brusk conduct on How to benchmark Pyrit How to benchmark Pyrit


 


Benchmarking Pyrit:


# pyrit benchmark
The Pyrit commandline-client (C) 2008 Lukas Lueg http://pyrit.googlecode.com
This code is distributed nether the GNU General Public License v3

The ESSID-blobspace seems to hold upward empty; you lot should practise an ESSID...
Available cores: 'Standard CPU', 'Nvidia CUDA'
Testing CPU-only nitty-gritty 'Standard CPU' (4 CPUs)... 1294.58 PMKs/s

Testing GPU nitty-gritty 'Nvidia CUDA' (Device 'GeForce 460 GTX')... 5409.43 PMKs/s

Feel gratis to post service your outputs inward the comment section.


Background on Pyrit


Pyrit allows to practise massive databases, pre-computing portion of the IEEE 802.11 WPA/WPA2-PSK authentication stage inward a space-time-tradeoff. Exploiting the computational might of Many-Core- as well as other platforms through ATI-Stream, Nvidia CUDA, OpenCL as well as VIA Padlock, it is currently yesteryear far the nearly powerful ready on against 1 of the world’s nearly used security-protocols.


WPA/WPA2-PSK is a subset of IEEE 802.11 WPA/WPA2 that skips the complex business of telephone substitution distribution as well as customer authentication yesteryear assigning every participating political party the same pre shared key. This master key is derived from a password which the administrating user has to pre-configure e.g. on his laptop as well as the Access Point. When the laptop creates a connectedness to the Access Point, a novel session key is derived from the master key to encrypt as well as authenticate next traffic. The “shortcut” of using a unmarried master key instead of per-user keys eases deployment of WPA/WPA2-protected networks for home- as well as small-office-use at the toll of making the protocol vulnerable to brute-force-attacks against it’s telephone substitution negotiation phase; it allows to ultimately bring out the password that protects the network. This vulnerability has to hold upward considered exceptionally disastrous every bit the protocol allows much of the telephone substitution derivation to hold upward pre-computed, making unproblematic brute-force-attacks fifty-fifty to a greater extent than alluring to the attacker. For to a greater extent than background encounter this article on the project’s blog.


The writer does non encourage or back upward using Pyrit for the infringement of peoples’ communication-privacy. The exploration as well as realization of the engineering discussed hither motivate every bit a utilization of their own; this is documented yesteryear the opened upward development, strictly sourcecode-based distribution as well as ‘copyleft’-licensing.


Pyrit is gratis software – gratis every bit inward freedom. Everyone tin give the sack inspect, re-create or modify it as well as portion derived function nether the GNU General Public License v3+. It compiles as well as executes on a broad diverseness of platforms including FreeBSD, MacOS X as well as Linux every bit operation-system as well as x86-, alpha-, arm-, hppa-, mips-, powerpc-, s390 as well as sparc-processors.


All code tin give the sack hold upward industrial plant life at http://pyrit.googlecode.com


A to a greater extent than theoretical background of Pyrit tin give the sack hold upward found here.


Thanks for reading.



Buat lebih berguna, kongsi:
close