The intention of this webapp is to brute force a 5 character from the md5 hash generated.
-
To deploy the webapp, create a GENI slice. Use the rspec given in the repo
pwd-cracker-rspec.xml
-
Once the nodes are available, clone this GitHub repo to all the nodes available
-
On all the worker nodes run
python3 workers.py <server host name> <port>
where serverhostname can be found by running the commandhostname
on the server and port is set to "6001" -
Login to the server node
-
Add the following information in the file geni_project.conf On line 2: 'Servername "Your server IP address"`
-
Run the deployment script
deploy.sh
. This script does the following- Adds the packages required (Flask)
- Installs apache2 and required wsgi libraries
- Transfers files to /var/www/html public folder
- Configures the virtual host settings
- Runs apache service
Your webserver is up and running! Open the browser and enter your server IP in the url.
Note :It's better to kill the port 6001 before running the management_service
with command fuser -k 6001/tcp
The link to our demo is here: https://drive.google.com/file/d/1FRWHhTjJ3a0sMqYxkwzPvF_QAhywVvxM/view?usp=sharing
Note : There will be a delay of 10s (the page reloads every 10s) before a cracked password reflects in the interface. This is Flask implementation issue rather than an issue with the distributed system.