TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Nvidia's flagship gaming GPU can crack complex passwords in under an hour

19 pointsby abunuwas12 months ago

9 comments

snowstormsun12 months ago
Very click baity and not good journalism imho. Starting with a &quot;A GeForce RTX 4090 could be cracking your password at this moment.&quot; tag line only to later note:<p>&gt; With bcrypt, the hashing times soared. While the GeForce RTX 4090 only took 59 minutes to crack an MD5 hash, the same graphics card would need 99 years.<p>It&#x27;s 2024 and if your password is still being hashed with md5, the news are: Your password could have been cracked 10 or more years ago already. Nobody sane uses that anymore and bcrypt still stands the test.
评论 #40578929 未加载
评论 #40578795 未加载
评论 #40578824 未加载
评论 #40578825 未加载
reify12 months ago
Using an 8 char password for those tests is very weak<p>On my old linux gaming rig with the AMD RX580 I can run through the entire WPA2 keyspace of 8 char lowercase or 8 char uppercase in 3 hours.<p>Md5 and sha1 takes seconds using JTR or hashcat masks or brute force or a straight attack using the Rust super fast Cracken password generator.
评论 #40578716 未加载
评论 #40556384 未加载
评论 #40580059 未加载
Hasz12 months ago
If anything, this approach shows how good a system passwords are. The downfall will be cheap quantum computers; it seems like we have some time until those are available.<p>An A100 is about $2&#x2F;hr, so cracking even a &quot;basic&quot; password hashed with bcrypt is going to cost a cool $24M in GPU alone. Most people concerned about this kind of attack are using a whole lot more chars. Apps should not be using MD5, use pbkdf2 or bcrypt.
评论 #40578832 未加载
评论 #40578816 未加载
lionkor12 months ago
I posted this below some comment but it may be worth reading for others:<p>start using very high entropy passwords which contain just about all printable ascii characters, excluding whitespace.<p>If a computer cant guess it, it won&#x27;t crack the hash, either.<p>Use a password manager and make those suckers 20-40 characters.<p>Use a master key that is just a super long phrase interleaved with special characters. Easy to remember. Like titles of books you like, plus authors, plus something only you know. Stuff like that. Example: `Franz&amp;Kafka$Meta-&#x2F;morphosis@@3385`. Even better, use such helpers to make a high entropy string of random letters.<p>I use a version of KeePass, with the actual file synced via syncthing to all devices plus a cloud. To me, it has never been an issue to copy paste or auto type a 40 character password -- in fact, I usually dont even notice.
Pesthuf12 months ago
Not quite as unrealistic as it seems - I have colleagues I can’t convince that SHA-256 is NOT good for passwords.<p>They just don’t understand that it’s safe for larger binaries, but absolutely not for short ASCII strings like passwords. Also they find it convenient since most modern programming languages and databases directly support those hash functions, but not something like bcrypt or Argon2.<p>So I do think there are many passwords out there you can crack easily and quickly nowadays.<p>I’ll try convincing them again…
评论 #40579041 未加载
skilled12 months ago
source,<p><a href="https:&#x2F;&#x2F;www.hivesystems.com&#x2F;blog&#x2F;are-your-passwords-in-the-green" rel="nofollow">https:&#x2F;&#x2F;www.hivesystems.com&#x2F;blog&#x2F;are-your-passwords-in-the-g...</a>
alanfranz12 months ago
Horrible article. You could crack md5 hashes in hours like 15 years ago. Nobody barely serious uses md5 for password derivation since long.
adverbly12 months ago
The label password is terrible. It implies that a single word is sufficient.<p>Something like secret or key would probably have been more appropriate in hindsight.
atmanactive12 months ago
By the way, I don&#x27;t understand how does password cracking work on a site&#x2F;system that has fail-to-ban?
评论 #40557580 未加载
评论 #40578767 未加载