January 6, 2011: 9:36 pm: Forensics, Password Security, Videocasts

We wrap up our tutorial series on AccessData’s Distributed Network Attack (DNA) password recovery software with Amazon EC2 worker agents.

In this part we spin our custom AMI instance up and install the DNA worker agent.  Then we spin up a total of 20 of the dual core instances to see the password attempt throughput.

You will run up costs by running instances. I am not legally nor financially responsible for your use or how you use these tutorials. Please only do things you are legally and financially authorized for.  It is on you.

I have not ironed out the HTML5 player fall back to flash issue yet.  So if you cannot play the video in this post you can download it HERE or watch it over in my YouTube Channel.


TwitterFacebookLinkedInInstapaperPocketApp.netGoogle+Share
January 1, 2011: 10:59 am: Forensics, Password Security, Videocasts

We continue our tutorial series on AccessData’s Distributed Network Attack (DNA) password recovery software with Amazon EC2 worker agents.

In this part we cover how to save a custom AMI instance to our Amazon S3 Storage.  Then we tie a new custom AMI to that image.  We end up with our own saved AMI image we can spin up later on demand. You will need to spin up and complete the customization steps from the Part Three video if you are continuing our tutorial series.  Otherwise this is a good video simply on how to save a custom linux AMI image for later use.

The tools and sites mentioned are:

You will run up storage costs by storing an image like this. I am not legally nor financially responsible for your use or how you use these tutorials. Please only do things you are legally and financially authorized for.  It is on you.

I have not ironed out the HTML5 player fall back to flash issue yet.  So if you cannot play the video in this post you can download it HERE or watch it over in my YouTube Channel.

Read More to get the list of commands used in this video.

(more…)

TwitterFacebookLinkedInInstapaperPocketApp.netGoogle+Share
December 30, 2010: 6:34 pm: Forensics, Password Security, Videocasts

We continue our tutorial series on AccessData’s Distributed Network Attack (DNA) password recovery software with Amazon EC2 worker agents.

We cover finding, accessing and modifying an existing Ubuntu 10.10 AMI.  If you need to watch a video just on the process of starting with an existing Community AMI to access and modify it then you should watch this part.  In the next part four we will show how to take our modified AMI and save it to our Amazon S3 as a new template AMI.

The tools mentioned are:

Keep in mind as we are moving into Amazon Web Services, even if you use the free tier account our tutorial touches on instances and data transfers that might incur costs.  Hopefully they are small per Amazon’s wonderful pricing. BUT  *I* am not legally nor financially responsible for your use or how you use these tutorials. Please only do things you are legally and financially authorized for.  It is on you.

I have not ironed out the HTML5 player fall back to flash issue yet.  So if you cannot play the video in this post you can download it HERE or watch it over in my YouTube Channel.

Read More to get the list of commands used in this video.

(more…)

TwitterFacebookLinkedInInstapaperPocketApp.netGoogle+Share
December 15, 2010: 6:33 pm: Forensics, Password Security, Videocasts

We continue our tutorial series on AccessData’s Distributed Network Attack (DNA) password recovery software with Amazon EC2 worker agents.  We move into Amazon EC2 and what you need to know about the service itself.  In part three we will cover starting up an instance based on an exisiting Amazon Machine Image (AMI), logging into it and adding the packages we need to prepare it as a worker.

Keep in mind as we are moving into Amazon Web Services, even if you use the free tier account our tutorial touches on instances and data transfers that might incur costs.  Hopefully they are small per Amazon’s wonderful pricing. BUT  *I* am not legally nor financially responsible for your use or how you use these tutorials. Please only do things you are legally and financially authorized for.  It is on you.

I have not ironed out the HTML5 player fall back to flash issue yet.  So if you cannot play the video in this post you can download it HERE or watch it over in my YouTube Channel.


TwitterFacebookLinkedInInstapaperPocketApp.netGoogle+Share
December 13, 2010: 6:59 am: Forensics, Password Security, Videocasts

We begin our tutorial series on AccessData’s Distributed Network Attack (DNA) password recovery software with Amazon EC2 worker agents.  We cover what we plan to do, why we are choosing to use Ubuntu Amazon Images (ami) as our worker agents then a walk through of what you need to know about the DNA Manager setup.  Part Two will be our move into Amazon EC2 and everything you need to know about the service.

I have not ironed out the HTML5 player fall back to flash issue yet.  So if you cannot play the video in this post you can download it HERE or watch it over in my YouTube Channel.

TwitterFacebookLinkedInInstapaperPocketApp.netGoogle+Share