Moscrack is a WPA cracker for use on clusters. It supports MOSIX, SSH, and RSH connectivity and works by reading a word list from STDIN or a file, breaking it into chunks, and passing those chunks off to separate processes that run in parallel. The parallel processes are then executed on different nodes in your cluster. All results are checked and recorded on your master node. Logging and error handling are taken care of. It is capable of running reliably for long periods of time, without the risk of losing data or having to restart. Moscrack uses aircrack-ng by default. Pyrit for WPA cracking and Dehasher for Unix password hashes are supported via plugins.
|Tags||Cluster GRID parallel WPA WPA2 Security crack aircrack-ng Mosix Pyrit CUDA OpenCL dynamic|
|Operating Systems||Linux Windows Cygwin FreeBSD Solaris|
Release Notes: This version implements a new API which allows the CGI and commandline mosctop to work from remote machines. There are several small bugfixes, many of which were reported by users. A new USB Live image was released, as well.
Release Notes: A plugin framework and API were created. A dehasher plugin was created to crack SHA256/512, MD5, DES, and *Blowfish Unix password hashes. A bug in hot config was fixed.
Release Notes: This is a minor bugfix release because 2.05b had an error in the sample config file that was causing Moscrack to fail to load. Other small things have been fixed at the same time. If you had trouble getting 2.05b to work, update to 2.06b.
Release Notes: This release added various automatic chunk size options, hung node detection, dynamic node configuration, improved CPU demands, TCP-based status checks, and a CGI interface.
Release Notes: This release adds RSH, Pyrit, and checkpoint/resume features.