Password cracking method, device and system

A password and location-specific technology, applied in the field of information security, can solve the problems of high real-time requirements for password cracking, password cracking, etc.

Active Publication Date: 2014-12-17
SAFE STONE INFORMATION TECHBEIJINGCO +1
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiments of the present invention provide a password cracking method, device and system, which are used to solve the problems in the prior art that the objects to be cracked that are closely related to the on-site environment cannot be solved, and the real-time requirements for password cracking are relatively high and rely on hardware equipment. The problem of password cracking for the object to be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password cracking method, device and system
  • Password cracking method, device and system
  • Password cracking method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] A password cracking method provided by Embodiment 1 of the present invention is applied to the client side, such as image 3 As shown, it specifically includes the following steps:

[0057] S301. According to the type of the object to be cracked, determine a location of decryption information required to crack the object to be cracked, where the location of the decryption information corresponds to the type.

[0058] In this step, the decryption information can be key information, for example, key hash value, key verification data of instant messaging software or email, encrypted data packet or key handshake data of wireless network, etc.; decryption information can also include encrypted Key information and decryption auxiliary information, such as key information and user name information related to the key information, and other decryption auxiliary information.

[0059] In this step, the object to be cracked may be an operating system login password to be cracked, ...

Embodiment 2

[0076] with the above image 3 Corresponding to the shown method, a password cracking method provided in Embodiment 2 of the present invention is applied to the decryption server side, such as Figure 4 As shown, it specifically includes the following steps:

[0077] S401. Receive the decryption information required for cracking the object to be cracked sent by the client.

[0078] In this step, the decrypted information may be received through a safe and reliable data link according to actual needs.

[0079] S402. Using the above decryption information, perform password cracking on the object to be cracked, and obtain a cracking result.

[0080] Further, in this step, the decryption server may be a decryption server specially designed for the type of object to be cracked, or a decryption server capable of cracking multiple types of objects to be cracked, if the decryption server is capable of cracking for A decryption server that cracks various types of objects to be crack...

Embodiment 3

[0086] A password cracking method provided by Embodiment 3 of the present invention is applied to the client side, such as Figure 5 As shown, it specifically includes the following steps:

[0087] S501. According to the type of the object to be cracked, determine a location of decryption information required to crack the object to be cracked, where the location of the decryption information corresponds to the type.

[0088] S502. Acquire the decrypted information according to the location of the decrypted information.

[0089] S503. Send the decryption information required to decrypt the object to be decrypted to the decryption server.

[0090] S504. Receive the remaining cracking time for cracking the object to be cracked sent by the decryption server.

[0091] S505. Displaying the remaining duration of cracking.

[0092] S506. Determine whether cracking is completed; if yes, go to step S510; if not, go to step S507.

[0093] S507. Determine whether the remaining crackin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a password cracking method, device and system, and relates to the field of information security. According to the password cracking method, a client side determines the position of decryption information needed for cracking an object to be cracked according to the type of the object to be cracked; according to the position of the decryption information, the decryption information is obtained; the decryption information needed for cracking the object to be cracked is sent to a decryption server; the decryption server receives the decryption information needed for cracking the object to be cracked from the client side; password cracking is carried out on the object to be cracked through the decryption information, and an obtained cracking result is sent to the client side; the client side receives the cracking result from the decryption server. The password cracking method, device and system solve the problem that in the prior art, password cracking can not be carried out on an object to be cracked closely related to the site environment and an object to be cracked which is high in requirement for password cracking real-time performance and depends on hardware equipment.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a password cracking method, device and system. Background technique [0002] In the prior art, a combination of software and hardware is mainly used to crack the password of the object to be cracked. In terms of hardware, a high-performance graphics processor (GPU, Graphic Processing Unit) is mainly used, and in terms of software, a rainbow table is mainly used. Wherein, the object to be cracked may be an operating system login password to be cracked, a wireless network access password to be cracked, an encrypted file password to be cracked, an encrypted disk to be cracked, and the like. [0003] In terms of hardware, GPU has super computing power in floating-point computing, parallel computing, etc., and its computing speed is dozens or even hundreds of times that of ordinary CPUs. Therefore, the application of GPU is no longer limited to the field of 3D graphics pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L29/08
CPCG06F21/6209
Inventor 韩晟毛阳陈志坚
Owner SAFE STONE INFORMATION TECHBEIJINGCO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products