Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Corsair H170i Elite Capellix XT review
Forspoken: PC performance graphics benchmarks
ASRock Z790 Taichi review
The Callisto Protocol: PC graphics benchmarks
G.Skill TridentZ 5 RGB 6800 MHz CL34 DDR5 review
Be Quiet! Dark Power 13 - 1000W PSU Review
Palit GeForce RTX 4080 GamingPRO OC review
Core i9 13900K DDR5 7200 MHz (+memory scaling) review
Seasonic Prime Titanium TX-1300 (1300W PSU) review
F1 2022: PC graphics performance benchmark review

New Downloads
FurMark Download v1.33.0.0
Intel ARC graphics Driver Download Version: 31.0.101.4091
Corsair Utility Engine Download (iCUE) Download v4.33.138
CPU-Z download v2.04
AMD Radeon Software Adrenalin 23.1.2 (RX 7900) download
GeForce 528.24 WHQL driver download
Display Driver Uninstaller Download version 18.0.6.0
Download Intel network driver package 27.8
ReShade download v5.6.0
Media Player Classic - Home Cinema v2.0.0 Download


New Forum Topics
NVIDIA GeForce 528.24 WHQL driver download & Discussion AMD Software: Adrenalin Edition 22.11.2 - Driver download and discussion FSR Thread Ambient Occlusion doesn't work on my laptop Microsoft Now Is Proactively Informing Windows 10 users to update to Windows 11 The Callisto Protocol: PC graphics performance benchmark analysis GeForce 528.33 CUDA Toolkit 12.0 Update 1 Nvidia shows signs ... AMD Ryzen 7 7700X sees price drop to $299 Netflix threatens to ban customers who share an account unauthorized




Guru3D.com » News » Password Cracking 25 GPU Monster Devours Passwords Real Fast

Password Cracking 25 GPU Monster Devours Passwords Real Fast

by Hilbert Hagedoorn on: 12/08/2012 10:06 AM | source: | 26 comment(s)
Password Cracking  25 GPU Monster Devours Passwords Real Fast

A presentation at the Passwords^12 Conference in Oslo, Norway, has moved the goalposts, again. Speaking on Monday, researcher Jeremi Gosney (a.k.a epixoip) demonstrated a rig that leveraged the Open Computing Language (OpenCL) framework and a technology known as Virtual OpenCL (VCL) to run the HashCat password cracking program across a cluster of five, 4U servers equipped with 25 AMD Radeon GPUs and communicating at 10 Gbps over Infiniband switched fabric. 

Gosney's system elevates password cracking to the next level, and effectively renders even the strongest passwords protected with weaker encryption algorithms, like Microsoft's LM and NTLM, obsolete. 

In a test, the researcher's system was able to churn through 348 billion NTLM password hashes per second. That renders even the most secure password vulnerable to compute-intensive brute force and wordlist (or dictionary) attacks. A 14 character Windows XP password hashed using LM, for example, would fall in just six minutes, said Per Thorsheim, organizer of the Passwords^12 Conference

[Note of clarification from Jeremi: "LM Is what is used on Win XP, and  LM converts all lowercase chars to uppercase, is at most 14 chars long, and splits the password into two 7 char strings before hashing -- so we only have to crack 69^7 combinations at most for LM. At 20 G/s we can get through that in about 6 minutes. With 348 billion NTLM per second, this means we could rip through any 8 character password (95^8 combinations) in 5.5 hours." ]

“Passwords on Windows XP? Not good enough anymore,” Thorsheim said.

Tools like Gosney’s GPU cluster aren’t suited for an “online” attack scenario against a live system. Rather, they’re used in “offline” attacks against collections of leaked or stolen passwords that were stored in encrypted form, Thorsheim said. In that situation, attackers aren’t limited to a set number of password attempts – hardware and software limitations are all that matter.

(slides available here - PDF)

The clustered GPUs clocked impressive speeds against more sturdy hashing algorithms as well, including MD5 (180 billion attempts per second, 63 billion/second for SHA1 and 20 billion/second for passwords hashed using the LM algorithm. So called “slow hash” algorithms fared better. The bcrypt (05) and sha512crypt permitted 71,000 and 364,000 per second, respectively.

Published benchmarks against common hashing algorithms using the 25 GPU HPC cluster

In an IRC chat with Security Ledger, Gosney said he has been working on CPU clustering for about five years and GPU clustering for the last four years.

“Then we just started trying to build the biggest GPU rigs we could, packing as many GPUs into a single server as possible so that we wouldn’t have to deal with clustering or distributing load,” Gosney wrote..



Password Cracking  25 GPU Monster Devours Passwords Real Fast Password Cracking  25 GPU Monster Devours Passwords Real Fast




« Intel HD Graphics Driver 15.28.10.2897 Windows 7 and 8 Download · Password Cracking 25 GPU Monster Devours Passwords Real Fast · Scythe Apsalus III-120 »

6 pages 1 2 3 4 5 6


Mufflore
Senior Member



Posts: 13854
Joined: 2010-05-22

#4474638 Posted on: 12/08/2012 10:08 AM
I need this!

Years ago I protected an archive of pictures before transporting them.
Then I lost the originals in a hard drive crash and was left only with the protected archive, thinking I knew the password.
But I cant remember the password for the life of me.

I've tried cracking it a few times, but after months, it was still going so decided to stop and wait for a more efficient method.

Mannerheim
Senior Member



Posts: 4902
Joined: 2004-01-24

#4474645 Posted on: 12/08/2012 10:51 AM
Wonder if theres a crypt "files" that destroys files after 10 wrong answer?
It woud make all these hack systems useless.

Mufflore
Senior Member



Posts: 13854
Joined: 2010-05-22

#4474648 Posted on: 12/08/2012 11:02 AM
The file would need an executable element.
There would always be a way to prevent the executable from running.

Mannerheim
Senior Member



Posts: 4902
Joined: 2004-01-24

#4474649 Posted on: 12/08/2012 11:05 AM
The file would need an executable element.
There would always be a way to prevent the executable from running.


well a random picture as password woud be a perfect key???
It woud have millions of codes? =) Picture woud not have to be perfect, only like 100x similar things in there, like landscape and buildings etc ...

Mufflore
Senior Member



Posts: 13854
Joined: 2010-05-22

#4474654 Posted on: 12/08/2012 11:24 AM
How would you use the picture to unlock the file?

6 pages 1 2 3 4 5 6


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2023