CFP last date
22 April 2024
Reseach Article

Parallel High-Performance Windows 7 Password Recovery using Weak Migration in Intra-Platform Mobile Agents Technology

by Dhuha Basheer Abdullah, Manar Talaat Ahmed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 2
Year of Publication: 2017
Authors: Dhuha Basheer Abdullah, Manar Talaat Ahmed
10.5120/ijca2017914602

Dhuha Basheer Abdullah, Manar Talaat Ahmed . Parallel High-Performance Windows 7 Password Recovery using Weak Migration in Intra-Platform Mobile Agents Technology. International Journal of Computer Applications. 169, 2 ( Jul 2017), 20-28. DOI=10.5120/ijca2017914602

@article{ 10.5120/ijca2017914602,
author = { Dhuha Basheer Abdullah, Manar Talaat Ahmed },
title = { Parallel High-Performance Windows 7 Password Recovery using Weak Migration in Intra-Platform Mobile Agents Technology },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 2 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 20-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume169/number2/27958-2017914602/ },
doi = { 10.5120/ijca2017914602 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:17.693879+05:30
%A Dhuha Basheer Abdullah
%A Manar Talaat Ahmed
%T Parallel High-Performance Windows 7 Password Recovery using Weak Migration in Intra-Platform Mobile Agents Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 2
%P 20-28
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The quest for developing computer architectures in terms of accuracy, efficiency and cost is unending to tackle a very large-scale system, that have a performance problem, using the parallel processing. The mature technology of the mobile agents is gaining more momentum to be adopted with the parallel processing over a grid computing in contrast to the traditional parallel applications, that base on either a dedicated hardware or software. In this paper, the mobile agents technology was proposed as a new approach to achieve a grid computing-based parallel processing for Windows 7 password recovery problem by using the brute-force procedure and realizing how the mobile agents technology can be used to execute complicated applications from the High performance computation community. In this work a weak migration in intra-platform mobile agent was used. The experimental results demonstrate the computational power of the proposed system.

References
  1. Hsien-Cheng C., Hung-Chang L., Hwan-Jeu Yu, Fei-Pei Lai, Kuo-Hsuan Huang and Chih-Wen Hsueh, (February 2013), "Password cracking based on learned patterns from disclosed password", International Journal of Innovative Computing, Information and Control ICIC, No. 2,Volume: 9, Pages:821- 839.
  2. Wesley M. E. and Mark A., (Feb. 2000), "Advantages of Parallel Processing and the Effects of Communications Time", NASA Glenn Research Center, Cleveland, OH United States, Report Number CR-209455, Provider: cite seer.
  3. Charles M. W., (2010), "Using probabilistic techniques to aid in password cracking attacks", Ph.D. thesis, The Florida State University College of Arts and Sciences.
  4. Martijn S., (October 2010), "Cracking Password Hashing Schemes using Graphics Processing Units", Ms.c. Thesis Proposal, Kerckhoffs Institute.
  5. Nick V. F. and Haile Sh., (2011), "Technology Corner: Brute Force Password Generation-Basic Iterative and Recursive Algorithms", Journal of Digital Forensics, Security and Law (JDFSL), Volume: 6(3),Pages: 79-86.
  6. David S., Ángel R. and Antonio M., (2007), "Parallel execution of complex tasks using a distributed, robust and flexible agent-based platform", In proceedings of the third workshop on development of multi-agent (DESMA07), II Spanish Congress of Information ( CEDI 07), Zaragoza , ISBN 978-84-9732-613-1, Pages: 11- 18.
  7. Johnny B., (2007), "Parallel Password Cracker: A Feasibility Study of Using Linux Clustering Technique in Computer Forensics", Second International Workshop on Digital Forensics and Incident Analysis (WDFIA), IEEE, Pages 75-82.
  8. Kostas Th., Charalampos M. and Ioannis P., (2009), "High-End Reconfigurable Systems for fast Windows’ Password Cracking", 17th IEEE Symposium on Field Programmable Custom Computing Machines, Pages: 287-290.
  9. Martijn S., (February 2011), "GPU-based Password Cracking: On the Security of Password Hashing Schemes regarding Advances in Graphics Processing Units", M.Sc. thesis, Radboud University Nijmegen.
  10. Chrysanthou Y., (2013), "Modern Password Cracking: A hands-on approach to creating an optimised and versatile attack", M.Sc. thesis in Information Security at Royal Holloway, University of London.
  11. Norm M., (July 2012), "Programming on Parallel Machines: GPU, Multicore, Clusters and More", University of California, Pages: 410.
  12. Ronald L. K. and Russell D. V., (Jan. 2008), "The CEH Preparing Guide: The Comprehensive Guide to Certified Ethical Hacking", John Wiley & Sons, Pages: 738.
  13. Yan W., (2002-01-08), "Dispatching Multiple Mobile Agents in Parallel for Visiting E-shops", The Third International Conference on Mobile Data Management-MDM, IEEE Computer Society Washinqton, DC, USA, ISBN: 0-7695-1500-2, Page: 61.
  14. Rahul J., (2005), "Mobile agents for e-commerce", KR School of Information Technology, Indian Institute of Technology, Bombay, Roll No.: 99329011.
  15. Parineeth M. R., (2002-07-01), "Mobile agents, Intelligent Assistants on the Internet", Resonance journal, Springer India, Issue 7, Volume: 7, Pages: 35-43.
  16. Uhrmacher A. M. and Gugler K., (2000), "Distributed, Parallel Simulation of Multiple, Deliberative Agents", Fourteenth Workshop on Parallel and Distributed Simulation, IEEE, Bologne, Pages: 101-108.
  17. Cheng-Zhong X. and Brian W., (Aug. 2000), "A Mobile Agent Based Push Methodology for Global Parallel Computing", In wiley journal: Concurrency: Practice and Experience, Issue: 8, Volume: 12, Pages: 705-726.
  18. Abdelkader O., (November 2009), "Mobile Agents-Based Applications: a Survey", International Journal of Computer Science and Network Security (IJCSNS), Issue: 11, Volume: 9, Pages: 331-339.
  19. Maryam B. and Martin G., (2008), "Distributed Password Recovery", Technical report, Ryerson University.
  20. Torsten I., Frank K., Michael W. and Tilmann K., (2000), "Migration of Mobile Agents in Java: Problems, Classification and Solutions", Proceeding of International Symposium on Multi-Agent and Mobile Agent in Virtual organization and E-Commerce, ICSC, Pages: 362-369.
  21. Sandip V., Bhavesh L. and Shreyansh B., (2011), "A Survey on Agent Communication Languages", International Conference on Innovation, Management and Service, Volume: 14, Page: 237.
  22. Aleksandar K. and Jochem v. K., (May 2011), "Distributed GPU Password Cracking", Research project, University of Van Amsterdam.
  23. Russell E. G., (2008), "High performance password cracking by implementing rainbow tables on nVidia graphics cards (IseCrack)", M.Sc. thesis, Iowa State University, Ames, Iowa.
  24. Jørgen W. B. and Rune W. N., (June 2009), "Procedures and Tools to Reset or Recover the Administrator Password on Popular Operating Systems", M.Sc. thesis, Norwegian University of Science and Technology, Department of Telematics.
Index Terms

Computer Science
Information Sciences

Keywords

HPC Mobile agent Parallel Processing password recovery problem.