KrakenHashes Glossary¶
This glossary provides definitions for terms used throughout the KrakenHashes system, organized by category.
Password Cracking Terminology¶
A-Z¶
Attack Mode: The method used by hashcat to attempt password recovery. Common modes include dictionary attack (-a 0), combinator attack (-a 1), brute-force/mask attack (-a 3), and hybrid attacks (-a 6, -a 7).
Benchmark: A test run to measure the cracking speed (hashes per second) of specific hardware against various hash algorithms.
Brute Force Attack: An attack method that systematically tries all possible character combinations within a defined character set and length range.
Candidate: A potential password generated during the cracking process that will be tested against the target hash.
Charset: A defined set of characters used in mask or brute-force attacks (e.g., ?l = lowercase, ?u = uppercase, ?d = digits, ?s = special characters).
Combinator Attack: An attack that combines words from two wordlists to create password candidates (e.g., "password" + "123" = "password123").
Cracked Hash: A hash that has been successfully reversed to reveal its plaintext password.
Dictionary Attack: An attack using a wordlist of common passwords and variations to attempt hash cracking.
Hash: A one-way cryptographic function output that represents a password. Common types include MD5, SHA1, SHA256, bcrypt, and NTLM.
Hash Algorithm: The specific cryptographic function used to create a hash (e.g., MD5, SHA-1, SHA-256, bcrypt, scrypt, Argon2).
Hash Rate: The speed at which password candidates are tested, measured in hashes per second (H/s), kilohashes/s (KH/s), megahashes/s (MH/s), or gigahashes/s (GH/s).
Hashcat: The underlying password recovery tool used by KrakenHashes for distributed cracking operations.
Hashlist: A collection of password hashes to be cracked, typically organized by source, client, or campaign.
Hybrid Attack: An attack combining wordlist entries with masks or rules to generate password candidates.
Keyspace: The total number of possible password combinations for a given attack configuration.
Mask: A pattern defining the structure of passwords to generate in a mask attack (e.g., ?u?l?l?l?d?d?d?d for Abcd1234 format).
Mask Attack: A targeted brute-force approach using patterns to generate password candidates based on known password structures.
Password Candidate: A potential password being tested against a hash during the cracking process.
Plaintext: The original, unencrypted password that produces a given hash.
Potfile: A file storing previously cracked hashes and their plaintext passwords to avoid redundant work.
Rainbow Table: Pre-computed tables of hash-to-plaintext mappings (not used by hashcat/KrakenHashes).
Rule: A transformation applied to wordlist entries to generate password variants (e.g., appending numbers, capitalizing letters, character substitution).
Rule Splitting: KrakenHashes feature that divides large rule files into chunks for distributed processing across multiple agents.
Salt: Random data added to passwords before hashing to prevent identical passwords from producing identical hashes.
Wordlist: A file containing potential passwords, one per line, used as input for dictionary attacks.
System Architecture Terms¶
A-Z¶
Agent: A compute node running the KrakenHashes agent software that executes hashcat jobs and reports results to the backend.
Agent Pool: A group of agents that can be assigned to work together on jobs.
API Key: Authentication credential used by agents to communicate with the backend server.
Backend: The central KrakenHashes server that manages jobs, stores data, and coordinates agent activities.
Claim Code: A one-time voucher code used to register new agents with the system.
Client: In KrakenHashes context, a customer or engagement for which password cracking services are performed.
Chunk: A portion of work (keyspace segment or rule subset) assigned to an individual agent for processing.
Chunking: The process of dividing large cracking jobs into smaller segments for distributed processing.
Data Retention: Policies and mechanisms for automatically removing old data based on configured time periods.
Heartbeat: Regular status updates sent by agents to the backend to indicate they are alive and processing.
Job: A single password cracking task with specific parameters, wordlists, rules, and target hashes.
Job Execution: An instance of a job being run, which may involve multiple agents and chunks.
Job Template: A reusable job configuration that can be applied to different hashlists.
Job Workflow: A sequence of jobs designed to implement a comprehensive attack strategy.
Preset: Pre-configured job templates or workflows for common attack scenarios.
Repository Pattern: Software design pattern used in KrakenHashes for database access abstraction.
Service Layer: Business logic layer in the backend that processes requests between handlers and repositories.
WebSocket: Protocol used for real-time bidirectional communication between agents and the backend.
Work Directory: Temporary directory where agents store files and data during job execution.
Security and Authentication Terms¶
A-Z¶
2FA/MFA: Two-Factor/Multi-Factor Authentication requiring multiple verification methods for user login.
Access Token: Short-lived JWT token used for API authentication.
API Authentication: Token-based authentication system for programmatic access to KrakenHashes.
Backup Codes: One-time use codes for account recovery when primary MFA method is unavailable.
Certificate Authority (CA): Entity that issues digital certificates for TLS/SSL encryption.
CORS: Cross-Origin Resource Sharing - security feature controlling which domains can access the API.
JWT: JSON Web Token - standard for securely transmitting information between parties as a JSON object.
LDAP: Lightweight Directory Access Protocol - external authentication system support.
Rate Limiting: Security measure limiting the number of API requests per time period.
RBAC: Role-Based Access Control - authorization system based on user roles (admin, user, agent, system).
Refresh Token: Long-lived token used to obtain new access tokens without re-authentication.
Self-Signed Certificate: TLS certificate signed by its creator rather than a trusted CA.
Session Management: System for tracking and controlling user login sessions.
TLS/SSL: Transport Layer Security/Secure Sockets Layer - encryption protocols for secure communication.
TOTP: Time-based One-Time Password - MFA method using authenticator apps.
Voucher: Authorization code for specific actions like agent registration or user invitation.
Performance and Optimization Terms¶
A-Z¶
Benchmark Score: Measured performance of hardware against specific hash algorithms.
Cache: Temporary storage of frequently accessed data to improve performance.
Concurrency: Number of simultaneous operations or connections the system can handle.
GPU: Graphics Processing Unit - primary hardware for high-speed password cracking.
GPU Utilization: Percentage of GPU resources being used during cracking operations.
Hash Rate: Speed of password testing, measured in hashes per second (H/s).
Keyspace Distribution: Method of dividing the total keyspace among multiple agents for parallel processing.
Load Balancing: Distribution of work across multiple agents based on their capabilities.
Memory Usage: RAM consumption by hashcat and the agent during operations.
Optimization: Techniques to improve cracking speed or resource efficiency.
Parallel Processing: Simultaneous execution of job chunks across multiple agents.
Performance Metrics: Measurements of system efficiency including hash rate, completion time, and resource usage.
Resource Allocation: Assignment of CPU, GPU, and memory resources to cracking operations.
Thermal Throttling: Automatic reduction in GPU performance to prevent overheating.
Workload Distribution: Strategy for assigning job chunks to agents based on their capabilities.
Common Abbreviations¶
A-Z¶
API: Application Programming Interface
CA: Certificate Authority
CLI: Command Line Interface
CPU: Central Processing Unit
CRUD: Create, Read, Update, Delete (database operations)
CSV: Comma-Separated Values
DB: Database
DNS: Domain Name System
DTO: Data Transfer Object
GPU: Graphics Processing Unit
H/s: Hashes per second
HTTP/HTTPS: Hypertext Transfer Protocol (Secure)
ID: Identifier
IP: Internet Protocol
JSON: JavaScript Object Notation
JWT: JSON Web Token
KH/s: Kilohashes per second (1,000 H/s)
LDAP: Lightweight Directory Access Protocol
MFA: Multi-Factor Authentication
MH/s: Megahashes per second (1,000,000 H/s)
NTLM: NT LAN Manager (Windows password hash format)
ORM: Object-Relational Mapping
OS: Operating System
RAM: Random Access Memory
RBAC: Role-Based Access Control
REST: Representational State Transfer
SHA: Secure Hash Algorithm
SMTP: Simple Mail Transfer Protocol
SQL: Structured Query Language
SSL: Secure Sockets Layer
TLS: Transport Layer Security
TOTP: Time-based One-Time Password
UI/UX: User Interface/User Experience
URI/URL: Uniform Resource Identifier/Locator
UUID: Universally Unique Identifier
VRAM: Video Random Access Memory (GPU memory)
WS: WebSocket
XML: Extensible Markup Language
This glossary is continuously updated as new features and terminology are introduced to the KrakenHashes system.