• Home
  • Blog
  • About Us
  • Index
Menu

#_shellntel

Street Address
City, State, Zip
Phone Number
A SynerComm Team

Your Custom Text Here

#_shellntel

  • Home
  • Blog
  • About Us
  • Index

How to build a (2nd) 8 GPU password cracker

February 20, 2019 Brian Judd
IMG_3613.jpg

Why? … Stop asking questions!

Background

In February 2017, we took our first shot at upgrading our old open-frame 6 GPU cracker (NVIDIA 970).  It served us well, but we needed to crack 8 and 9-character NTLM hashes within hours and not days. The 970s were not cutting it and cooling was always a challenge. Our original 8 GPU rig was designed to put our cooling issues to rest.

Speaking of cooling issues, we enjoyed reading all of the comments on our 2017 build. Everyone seemed convinced that we were about to melt down our data center. We thank everyone for their concern (and entertainment).

"the graphics cards are too close!"

"nonsense. GTX? LOL. No riser card? LOL good luck."

To address cooling, we specifically selected (at the time) NVIDIA 1080 Founders Edition cards due to their 'in the front and out the rear' centrifugal fan design.  A couple months after our initial blog, we upgraded from NVIDIA 1080 to NVIDIA 1080 Ti cards.  And admitedly, we later found that more memory was useful when cracking with large (>10GB) wordlists.

OK, But Why?

Shortly after building our original 8 GPU cracker, we took it to RSA and used it as part of a narrated live hacking demo. Our booth was a play on the Warlock’s command center where we hacked Evil Corp from the comfort of Ma’s Basement. (yeah, a bit unique for RSA…)

IMG_2529.jpg

Kracken 3 - RSA Debut

Our 1st 8 GPU rig built in February 2017

Shopping List

You have a little flexibility here, but we’d strongly suggest the Tyan chassis and Founders Edition NVIDIA cards. The Tyan comes with the motherboard, power supplies (3x), and arrives all cabled up and ready to build. We went with a 4TB SSD to hold some very large wordlists but did not setup RAID with a 2nd drive (yet). Higher CPU speeds and memory mostly help with dictionary attacks; therefore a different build may be better suited for non-GPU cracking.

Hardware

  • Tyan B7079F77CV10HR-N

  • 2x Intel Xeon E5-2630 V4 Broadwell-EP 2.2 GHz (LGA 2011-3 85W)

    • Be sure to get V3 or V4 (V4 recommended to support DDR4 2400 RAM)! *We learned the hard way!

  • 128GB (4 x 32GB) DDR4 2400 (PC4 19200) 288-Pin 1.2V ECC Registered DIMM

  • Samsung EVO 4TB 2.5” SSD

Software

  • Ubuntu - 18.04 LTS server (x64)

  • hashcat - www.hashcat.net

  • hashview - www.hashview.io

Cost

  • Depends heavily on the current market price of GPUs. ($12K-$17K)

  • At least the software is all free! And who can put a price on cracking performance?

The Build

Despite being a hash munching monster and weighing nearly 100 lbs. when assembled, this build is easy enough for novice.

YouTube Video of Build

Tyan B7079F77CV10HR-N

Tyan B7079F77CV10HR-N

Hardware Build Notes

  1. Normally I like to install the CPU(s) first, but I ordered the wrong ones and had to install them 3 days later. Be sure to get V3 or V4 XEON E5 processors, V2 is cheaper but ‘it don’t fit’.

    1. When installing the (included) Tyan heat-sinks, we added a little extra thermal paste even through the heat-sinks already have some on the bottom.

  2. Install memory starting in Banks A and E (see diagram above). CPU 0 and CPU 1 each require matching memory. Memory Banks A-D are for CPU 0 and Memory Banks E-H are for CPU 1. We added 2x 32GB in Bank A and 2x 32GB in Bank E for a total of 128GB RAM.

  3. Install hard drive for (Linux) operating system. We chose a 4TB SSD drive to ensure plenty of storage for large wordlists and optimum read/write performance. The chassis has 10 slots so feel free to go crazy with RAID and storage if you wish.

  4. Prep all 8 GPU cards by installing the included Tyan GPU mounting brackets. They are probably not required, but they ensure a good seat.

  5. Install GPU cards. Each NVIDIA 1080 Ti requires 2 power connections per card. The regular 1080 cards only require 1 if you decide not to go the ‘Ti’ route. Again, Tyan includes all necessary power cables with the chassis.

  6. Connect or insert OS installation media. I hate dealing with issues related to booting and burning ISOs written to USB flash; so we went with a DVD install (USB attached drive).

  7. Connect all 3 power cords to the chassis and connect the other end of each cord to a dedicated 15A or 20A circuit. While cracking, the first 2 power supplies draw 700-900W with a less on the 3rd. They do like dedicated circuits though, it is easy to trip breakers if anything else is sharing the circuit.

Software Build Notes

Everyone has their own preferred operating system and configuration, so we’ve decided not to go telling you how to do your thing. If you are new to installing and using a Linux operating system, we did include a complete walk-through in our February 2017 post: How to build a 8 GPU password cracker.

The basic software build steps are as follows:

  1. Install your preferred Linux OS. We chose Ubuntu 18.04 LTS (64 bit - server). Fully update and upgrade.

  2. Prepare for updated NVIDIA drivers:

2a. Blacklist the generic NVIDIA Nouveau driver

sudo bash -c "echo blacklist nouveau > /etc/modprobe.d/blacklist-nvidia-nouveau.conf"
sudo bash -c "echo options nouveau modeset=0 >> /etc/modprobe.d/blacklist-nvidia-nouveau.conf"
sudo update-initramfs -u
sudo reboot

2b. Add 32-bit headers

sudo dpkg --add-architecture i386
sudo apt-get update
sudo apt-get install build-essential libc6:i386

2c. Download, unzip and install the latest NVIDIA driver from http://www.nvidia.com/Download/index.aspx

nvidia.png
sudo ./NVIDIA*.run
sudo reboot

3. Download and install hashcat from https://hashcat.net/hashcat/

4. (Optional) Download and install hashview from http://www.hashview.io/

The Outcome

Go ahead, run a benchmark with hashcat to make sure everything works!

./hashcat-5.0.0/hashcat64.bin -m 1000 -b

Going to be at RSA 2019? Stop by and see us! https://events.synercomm.com/events/138/

@njoyzrd

In Password Cracking Tags Kracken, KrackIT, Kracken3, NTLM
← AWS Metadata Endpoint - How to not get pwned like Capital OneDA 101 - Protecting your Domain Admin Account →
Latest Blog Posts
Modern Attack Surface.png
Dec 23, 2020
In Scope or Out of Scope?
Dec 23, 2020
Dec 23, 2020
Building a Pwnagotchi
May 15, 2020
Building a Pwnagotchi
May 15, 2020
May 15, 2020
AWS Metadata Endpoint - How to not get pwned like Capital One
Aug 27, 2019
AWS Metadata Endpoint - How to not get pwned like Capital One
Aug 27, 2019
Aug 27, 2019
How to build a (2nd) 8 GPU password cracker
Feb 20, 2019
How to build a (2nd) 8 GPU password cracker
Feb 20, 2019
Feb 20, 2019
DA 101 - Protecting your Domain Admin Account
Oct 22, 2018
DA 101 - Protecting your Domain Admin Account
Oct 22, 2018
Oct 22, 2018
OpenSSH < 7.7 - Username Enumeration Exploit
Aug 21, 2018
OpenSSH < 7.7 - Username Enumeration Exploit
Aug 21, 2018

On August 15th, 2018 a vulnerability was posted on the OSS-Security list. This post explained that OpenSSH (all versions prior to and including 7.7) is vulnerable to username enumeration by sending a malformed public key authentication request (SSH2_MSG_USERAUTH_REQUEST with type publickey) to the service.

Aug 21, 2018
Mar 17, 2017
Thoughts on Blocking Powershell.exe
Mar 17, 2017
Mar 17, 2017
How to build a 8 GPU password cracker
Feb 13, 2017
How to build a 8 GPU password cracker
Feb 13, 2017
Feb 13, 2017
The Upside Down - Ventures into the 5GHZ Spectrum
Oct 26, 2016
The Upside Down - Ventures into the 5GHZ Spectrum
Oct 26, 2016
Oct 26, 2016
Oct 6, 2016
spin-up: Quickly Launch a Provisioned EC2 Attack Server
Oct 6, 2016
Oct 6, 2016
Sep 23, 2016
Luckystrike: An Evil Office Document Generator.
Sep 23, 2016
Sep 23, 2016
The Number One Pentesting Tool You're Not Using
Aug 3, 2016
The Number One Pentesting Tool You're Not Using
Aug 3, 2016
Aug 3, 2016
Screen Shot 2016-07-08 at 10.22.17 AM.png
Jul 8, 2016
Invoke-SMBAutoBrute.ps1 - Smart SMB Brute Forcing
Jul 8, 2016
Jul 8, 2016
Screen Shot 2016-06-07 at 4.13.13 PM.png
Jun 8, 2016
Weaponizing Nessus
Jun 8, 2016
Jun 8, 2016
May 24, 2016
Update to ProxyCannon
May 24, 2016
May 24, 2016
May 12, 2016
VPN over DNS
May 12, 2016
May 12, 2016
Feb 22, 2016
Websocket based egress buster
Feb 22, 2016
Feb 22, 2016
Feb 18, 2016
Abusing Exchange Web Service - Part 1
Feb 18, 2016
Feb 18, 2016
Screen Shot 2016-02-04 at 2.36.33 PM.png
Feb 8, 2016
Why Security Awareness Training Fails
Feb 8, 2016
Feb 8, 2016
Oct 6, 2015
Assisted directory brute forcing
Oct 6, 2015
Oct 6, 2015
crEAP - Harvesting Users on Enterprise Wireless Networks
Oct 1, 2015
crEAP - Harvesting Users on Enterprise Wireless Networks
Oct 1, 2015
Oct 1, 2015
Sep 26, 2015
[UPDATE] Creating your own private botnet for scanning.
Sep 26, 2015
Sep 26, 2015
Sep 25, 2015
Drone Code Execution (Part 1)
Sep 25, 2015
Sep 25, 2015
PowerShell Memory Scraping for Credit Cards
Sep 18, 2015
PowerShell Memory Scraping for Credit Cards
Sep 18, 2015
Sep 18, 2015
Sep 9, 2015
Intro To Active Directory Delegation
Sep 9, 2015
Sep 9, 2015
Jul 27, 2015
Using PowerShell & Unicorn to Get Persistence
Jul 27, 2015
Jul 27, 2015
screenshot.png
Jul 14, 2015
Creating your own private botnet for scanning.
Jul 14, 2015
Jul 14, 2015
Jun 18, 2015
Circle City Con: 2015 CTF Writeup
Jun 18, 2015
Jun 18, 2015
Qualys Scanner API In Powershell Including External Ticket Creation
Jun 12, 2015
Qualys Scanner API In Powershell Including External Ticket Creation
Jun 12, 2015
Jun 12, 2015
Jun 12, 2015
Validating the Effectiveness of Your Controls
Jun 12, 2015
Jun 12, 2015

Shellntel™ - Brought to you by SynerComm