Skip to content

UPAT (Ultimate Password Awareness Toolkit) is a toolkit to assess passwords strength through local attacks, you can run dictionary attacks, brute-force/mask attacks, analyze wordlists or create new ones, and generate strong passwords.

License

Notifications You must be signed in to change notification settings

PJ-Resp3ct/UPAT

Repository files navigation

UPAT

UPAT (Ultimate Password Awareness Toolkit) is a toolkit to assess passwords strength through local attacks, you can run dictionary attacks, brute-force/mask attacks, analyze wordlists or create new ones, and generate strong passwords.

Disclaimer

This tool is developed for academic purposes only, in an effort to promote situational awareness. The tool shall not be used without proper authorization from the organization/individuals under testing. We hold no responsibility for any misuse of the tool.

Usage

A user-friendly interface allows to run through all steps and display the tools results.

Pre-requisites:

  • CeWL >=5.2
  • Crunch >= 3.6
  • DyMerge >= 0.2
  • Hash Buster >= 1.0
  • Hashcat >= 4.1.0
  • Hashcat-Utils >= 1.8
  • John the Ripper Bleeding Jumbo Edition
  • Mentalist >= 1.0
  • PACK >= 0.0.4
  • PassTrust >= 2.1
  • Pipal >= 3.1
  • Wyd >= 0.2

Tested environments:

  • Ubuntu 16.04 LTS
  • CentOS

1/ Once dependancies are installed, run ./home.py

2/ Adjust the tools path and dictionary repo under Configure tab

3/ Run the Speed Test to benchmark your hardware

4/ Put some dictionaries under the repo folder, some good ones:

Now you are good to go.


Author: Pierre Jourdan

UPAT has been developed in the context of the Master's thesis project while studying towards the MSc Cybersecurity degree at UCLan Cyprus, under the supervision of Dr Eliana Stavrou.

Feel free to contribute.


Download a ready-to use VM for VMWare Player with UPAT and prerequisites installed in Ubuntu 16.04 here: https://drive.google.com/open?id=1Oqn6LXLQQ1KIe3ASKGF9h7T7SKiec-ki (7.7GB)

Login with pj / root (yes that's not secure...)

Launch a Terminal, cd Desktop, then run ./UPAT.sh


An indicative roadmap for future improvements:

  • [DONE 1/10/17] A huge announcement reported in august 2017 was the release of the biggest passwords dictionary from Have I Been Pwned website, consisting of 306 million entries which could be added to the Wordlists repository and used to check instantly if a given password has been leaked online and thus exclude it from use.

  • [DONE 30/9/17] Integrate Hash Buster, a Python script released in June 2017 that takes as input an encrypted password and asks online services who basically host rainbow tables and known/leaked hashes for the matching plaintext. Ethical concerns however apply as the passwords would then be uploaded online on servers outside of our control.

  • Recommendations on how to create strong passwords are evolving as per NIST 800-63B Digital Identity Guidelines published in June 2017, and it is now preferred to allow long pass phrases which are simple to remember while being very hardly attackable through brute-force, and not impose composition rules with results in complex/unfriendly constructions. A tool such as Abbrase would be good to add in the Generate password tab of UPAT.

  • A tool measuring password strength would be good to add or even implementing a local algorithm

  • The ability to run distributed attacks taking advantage of multiple computers processing units to optimize cracking time. A server/client tool exists named Hashtopussy and allows to run distributed Hashcat jobs.

  • a script to install automatically all pre-requisites would be nice.

  • port the tool to Python 3

About

UPAT (Ultimate Password Awareness Toolkit) is a toolkit to assess passwords strength through local attacks, you can run dictionary attacks, brute-force/mask attacks, analyze wordlists or create new ones, and generate strong passwords.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published