Understanding Jobs and Workflows¶
Quick Overview¶
KrakenHashes uses a two-tier system to organize password cracking attacks:
- Preset Jobs: Individual attack configurations (like a single recipe)
- Job Workflows: Collections of preset jobs that run in sequence (like a cookbook)
This system ensures consistent, efficient password auditing across your organization.
How It Works¶
The Password Cracking Process¶
When you submit a hashlist for cracking, KrakenHashes can apply a workflow that: 1. Tries the most likely passwords first (common passwords) 2. Progressively tries more complex attacks 3. Ensures no time is wasted on inefficient approaches
Example Workflow in Action¶
Imagine you're auditing passwords for a company. A typical workflow might:
- First: Check against known leaked passwords (fast, high success rate)
- Next: Try common passwords with variations (password1, Password123!)
- Then: Combine company terms with numbers (CompanyName2024)
- Finally: Attempt more exhaustive searches if needed
Benefits¶
Consistency¶
- Every password audit follows the same proven methodology
- No steps are accidentally skipped
- New team members can run expert-level audits immediately
Efficiency¶
- Fast attacks run first, finding easy passwords quickly
- Resource-intensive attacks only run when necessary
- Priority system ensures optimal resource usage
Customization¶
- Different workflows for different scenarios:
- Quick compliance checks
- Thorough security audits
- Industry-specific patterns
- Post-breach assessments
Common Attack Types¶
Dictionary Attacks¶
Uses lists of known passwords: - Common passwords (password, 123456) - Previously leaked passwords - Industry-specific terms
Rule-Based Attacks¶
Applies transformations to dictionary words: - Capitalize first letter - Add numbers at the end - Replace letters with symbols (@ for a, 3 for e)
Hybrid Attacks¶
Combines dictionaries with patterns: - Dictionary word + 4 digits (password2024) - Year + dictionary word (2024password)
Brute Force¶
Tries all possible combinations for a pattern: - All 4-digit PINs (0000-9999) - All 6-character lowercase (aaaaaa-zzzzzz)
Understanding Priorities¶
Jobs within workflows run in priority order: - Critical Priority (90-100): Emergency response, security incidents - High Priority (70-89): Time-sensitive audits, compliance deadlines - Normal Priority (40-69): Standard security assessments - Low Priority (10-39): Background processing, research tasks - Minimal Priority (0-9): Non-urgent, opportunistic processing
How Priority Affects Your Jobs¶
- Execution Order: Higher priority jobs start first when agents are available
- Resource Allocation: Critical jobs can use more agents simultaneously
- Queue Management: Jobs with the same priority run in the order they were submitted
- Smart Scheduling: The system optimizes agent assignment based on priorities
Job Interruption and Resumption¶
KrakenHashes includes an intelligent job interruption system that ensures critical tasks get the resources they need without losing work on other jobs.
How Job Interruption Works¶
When a high-priority job needs immediate attention:
- Automatic Detection: The system identifies when critical jobs are waiting
- Smart Interruption: Only interrupts lower priority jobs when necessary
- Progress Preservation: All completed work is saved before interruption
- Seamless Resumption: Interrupted jobs automatically continue when resources are available
What This Means for Your Jobs¶
- No Lost Work: If your job is interrupted, it will resume from where it stopped
- Transparent Process: You'll see the job status change from "running" to "pending" and back
- Fair Resource Sharing: The system balances urgent needs with ongoing work
- Automatic Management: No manual intervention required for resumption
Understanding Job Statuses¶
The Jobs Management interface showing active password cracking jobs with status filtering (ALL, PENDING, RUNNING, COMPLETED, FAILED). The table displays job details including name, hashlist, progress, keyspace, cracked count, agents assigned, priority level, and available actions.
- Pending: Job is waiting for available agents
- Running: Job is actively being processed
- Completed: Job finished successfully
- Failed: Job encountered an error
- Interrupted: Job was paused for a higher priority task (automatically resumes)
Priority Best Practices¶
To ensure optimal performance:
- Use Appropriate Priorities: Don't mark everything as high priority
- Plan for Interruptions: Expect that low-priority jobs may pause for critical work
- Monitor Progress: Check job status regularly for time-sensitive tasks
- Communicate Urgency: Work with administrators to set correct priorities for critical audits
Monitoring Job Execution¶
The Job Details Page¶
Once you've submitted a job, you can monitor its progress in real-time through the Job Details page. Access it by clicking on any job in the Jobs list or navigating to /jobs/{job-id}
.
The Job Details page shows real-time progress, assigned agents, and crack results
Real-Time Updates¶
The Job Details page provides live updates for active jobs:
Auto-Refresh¶
- Automatic Updates: The page refreshes every 5 seconds for running jobs (configurable by administrators)
- Smart Refresh: Auto-refresh pauses when you're editing settings to prevent data loss
- Manual Refresh: Click the refresh button for immediate updates
- Status-Based: Auto-refresh only active for pending, running, or paused jobs
Progress Visualization¶
The new progress bar provides at-a-glance job status: - Visual Progress: Color-coded bar showing completion percentage - Keyspace Coverage: Shows processed vs. total keyspace - Time Estimates: Estimated time remaining based on current speed - Agent Distribution: See how work is distributed across agents
Information Available¶
Job Summary¶
- Status: Current job state (pending, running, completed, failed)
- Priority: Job priority level and queue position
- Hashlist: Target hashlist being processed
- Workflow: Associated workflow and current preset job
Performance Metrics¶
- Hash Rate: Combined speed across all agents (H/s, MH/s, GH/s)
- Keyspace Progress: Amount of keyspace processed
- Cracks Found: Real-time count of cracked passwords
- Efficiency: Cracks per billion attempts
Agent Assignment¶
- Active Agents: List of agents currently working on the job
- Agent Performance: Individual agent hash rates and progress
- Task Distribution: How chunks are distributed
- Agent Status: Online/offline status of assigned agents
Crack Results¶
- Real-Time Cracks: See passwords as they're cracked
- Crack Positions: Where in the attack the crack occurred
- Plain Text: Recovered passwords (if permissions allow)
- Export Options: Download results in various formats
Completed Tasks History¶
The Job Details page maintains a comprehensive history of all completed tasks, providing valuable insights into job execution:
Information Displayed¶
For each completed task, you can view: - Agent ID: The specific agent that processed the task - Task ID: Unique identifier for reference and troubleshooting
- Completion Time: When the task finished processing - Keyspace Range: The exact portion of keyspace that was processed - Final Progress: The percentage of the task that was completed - Average Speed: Hash rate achieved during task execution - Cracks Found: Number of passwords cracked (click to view details in the POT)
Organization and Navigation¶
- Automatic Sorting: Tasks are sorted by completion time, with most recent first
- Pagination Controls: Navigate through large task lists with configurable page sizes:
- 25 items per page (default)
- 50, 100, or 200 items for larger views
- Persistent History: Completed tasks remain visible even after job completion
Use Cases¶
The completed tasks history helps with: - Performance Analysis: Compare hash rates across different agents to identify performance variations - Crack Distribution: See which keyspace ranges yielded the most cracks - Troubleshooting: Identify if specific agents or keyspace ranges had issues - Audit Trail: Maintain a complete record of job execution for compliance or review - Resource Planning: Analyze task completion patterns to optimize future job configurations
Performance Insights
Use the completed tasks table to identify your most efficient agents and optimize task distribution in future jobs.
Interactive Controls¶
While monitoring your job, you can:
Adjust Settings¶
- Change Priority: Modify job priority to speed up or slow down execution
- Agent Limits: Adjust maximum agents assigned to the job
- Pause/Resume: Temporarily halt job execution
Job Actions¶
- Stop Job: Terminate the job (progress is saved)
- Clone Job: Create a new job with the same settings
- View Logs: Access detailed execution logs
- Export Results: Download crack results and reports
Understanding Progress Indicators¶
Keyspace Progress¶
The keyspace represents the total search space: - Linear Progress: Steady advancement through wordlist attacks - Chunk-Based: Progress jumps as chunks complete - Rule Multiplication: Progress may seem slow with large rule sets
Time Estimates¶
Estimated completion times are based on: - Current hash rate - Remaining keyspace - Historical performance - Agent availability
Estimate Accuracy
Time estimates become more accurate as the job progresses and the system learns the actual performance characteristics.
Monitoring Best Practices¶
- Check Early Progress: Verify the job started correctly in the first few minutes
- Monitor Agent Assignment: Ensure sufficient agents are assigned
- Watch for Stalls: If progress stops, check agent status
- Review Partial Results: Examine cracked passwords as they appear
- Adjust Priority if Needed: Increase priority for time-sensitive jobs
Troubleshooting Job Issues¶
Job Stuck in Pending¶
- Check if agents are available
- Verify agent scheduling settings
- Review job priority relative to other jobs
Slow Progress¶
- Check assigned agent count
- Review chunk size settings
- Verify network connectivity
- Consider increasing job priority
No Cracks Found¶
- Normal for strong passwords
- Review attack methodology
- Consider different workflows
- Check hashlist format
Real-World Applications¶
Compliance Auditing¶
Verify passwords meet policy requirements: - Minimum length checks - Complexity requirements - Banned password lists
Security Assessments¶
Identify weak passwords before attackers do: - Test against current attack techniques - Benchmark password strength - Provide actionable reports
Incident Response¶
Quickly assess breach impact: - Check if compromised passwords are reused - Identify affected accounts - Prioritize password resets
What This Means for You¶
As a user, the preset jobs and workflows system: - Ensures thorough password testing - Provides consistent results - Optimizes cracking time - Delivers actionable insights
Your administrators have configured these workflows based on: - Industry best practices - Your organization's specific needs - Current threat landscape - Compliance requirements
Next Steps¶
- Review your hashlist results to understand which attacks succeeded
- Work with your security team to address found passwords
- Consider implementing stronger password policies
- Schedule regular password audits using these workflows
For more detailed information about creating and managing workflows, see the administrator documentation.