Password Cracking 25 GPU Monster Devours Passwords Real Fast
A presentation at the Passwords^12 Conference in Oslo, Norway, has moved the goalposts, again. Speaking on Monday, researcher Jeremi Gosney (a.k.a epixoip) demonstrated a rig that leveraged the Open Computing Language (OpenCL) framework and a technology known as Virtual OpenCL (VCL) to run the HashCat password cracking program across a cluster of five, 4U servers equipped with 25 AMD Radeon GPUs and communicating at 10 Gbps over Infiniband switched fabric.
Gosney's system elevates password cracking to the next level, and effectively renders even the strongest passwords protected with weaker encryption algorithms, like Microsoft's LM and NTLM, obsolete.
In a test, the researcher's system was able to churn through 348 billion NTLM password hashes per second. That renders even the most secure password vulnerable to compute-intensive brute force and wordlist (or dictionary) attacks. A 14 character Windows XP password hashed using LM, for example, would fall in just six minutes, said Per Thorsheim, organizer of the Passwords^12 Conference
[Note of clarification from Jeremi: "LM Is what is used on Win XP, and LM converts all lowercase chars to uppercase, is at most 14 chars long, and splits the password into two 7 char strings before hashing -- so we only have to crack 69^7 combinations at most for LM. At 20 G/s we can get through that in about 6 minutes. With 348 billion NTLM per second, this means we could rip through any 8 character password (95^8 combinations) in 5.5 hours." ]
“Passwords on Windows XP? Not good enough anymore,” Thorsheim said.
Tools like Gosney’s GPU cluster aren’t suited for an “online” attack scenario against a live system. Rather, they’re used in “offline” attacks against collections of leaked or stolen passwords that were stored in encrypted form, Thorsheim said. In that situation, attackers aren’t limited to a set number of password attempts – hardware and software limitations are all that matter.
(slides available here - PDF)
The clustered GPUs clocked impressive speeds against more sturdy hashing algorithms as well, including MD5 (180 billion attempts per second, 63 billion/second for SHA1 and 20 billion/second for passwords hashed using the LM algorithm. So called “slow hash” algorithms fared better. The bcrypt (05) and sha512crypt permitted 71,000 and 364,000 per second, respectively.
Published benchmarks against common hashing algorithms using the 25 GPU HPC cluster
In an IRC chat with Security Ledger, Gosney said he has been working on CPU clustering for about five years and GPU clustering for the last four years.
“Then we just started trying to build the biggest GPU rigs we could, packing as many GPUs into a single server as possible so that we wouldn’t have to deal with clustering or distributing load,” Gosney wrote..
Posts: 7111
Joined: 2008-03-06
whoa, the powah needed to feed this monster!
but what it is new is the scale,the concept is not new,all mobile phone shops have a smaller version to calculate hashes for unlocking codes.
we build some of those rigs,so..
Senior Member
Posts: 13956
Joined: 2010-05-22
Same as file asks password, it woud ask picture. There are some programs made that identifyes faces and fingerprints... so it shoud not be impossible to make..
Picture just woud have millions of code to crack, compared to any other password.
Im not genious about these but more like thinker.. =)
All you are doing is using a longer password.
You can do that without a picture file.
Even if you did use a picture file, it will need a defined process, this process will be cracked.
Nothing will be gained other than a more complicated way of using a longer password, making it more annoying for the end user.
Seems Win8 has somekind picture password... but it gives u a photo and have to draw to open... Woud be better if u had a photo in memory stick and win woud not give a photo, woud have to select it ur self, from hundreds of photos and then draw...
http://www.youtube.com/watch?v=NQtG6d7rCSk
If you have an operating system based protection system, it can be foiled by using a different operating system to crack the file.
Granted it adds a bit of time 'before' it is cracked, but when it has been worked out once, it can be used all the time.
Senior Member
Posts: 6070
Joined: 2011-01-02
good. Now install F@H and turn this monster into something useful.
Senior Member
Posts: 1066
Joined: 2011-12-04
Wonder if anyone with a password like 'love,' 'sexy,' or '1234' is reading this?

Posts: 4902
Joined: 2004-01-24
Same as file asks password, it woud ask picture. There are some programs made that identifyes faces and fingerprints... so it shoud not be impossible to make..
Picture just woud have millions of code to crack, compared to any other password.
Im not genious about these but more like thinker.. =)
Seems Win8 has somekind picture password... but it gives u a photo and have to draw to open... Woud be better if u had a photo in memory stick and win woud not give a photo, woud have to select it ur self, from hundreds of photos and then draw...
http://www.youtube.com/watch?v=NQtG6d7rCSk