TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Nvidia's flagship gaming GPU can crack complex passwords in under an hour

19 点作者 abunuwas11 个月前

9 条评论

snowstormsun11 个月前
Very click baity and not good journalism imho. Starting with a &quot;A GeForce RTX 4090 could be cracking your password at this moment.&quot; tag line only to later note:<p>&gt; With bcrypt, the hashing times soared. While the GeForce RTX 4090 only took 59 minutes to crack an MD5 hash, the same graphics card would need 99 years.<p>It&#x27;s 2024 and if your password is still being hashed with md5, the news are: Your password could have been cracked 10 or more years ago already. Nobody sane uses that anymore and bcrypt still stands the test.
评论 #40578929 未加载
评论 #40578795 未加载
评论 #40578824 未加载
评论 #40578825 未加载
reify11 个月前
Using an 8 char password for those tests is very weak<p>On my old linux gaming rig with the AMD RX580 I can run through the entire WPA2 keyspace of 8 char lowercase or 8 char uppercase in 3 hours.<p>Md5 and sha1 takes seconds using JTR or hashcat masks or brute force or a straight attack using the Rust super fast Cracken password generator.
评论 #40578716 未加载
评论 #40556384 未加载
评论 #40580059 未加载
Hasz11 个月前
If anything, this approach shows how good a system passwords are. The downfall will be cheap quantum computers; it seems like we have some time until those are available.<p>An A100 is about $2&#x2F;hr, so cracking even a &quot;basic&quot; password hashed with bcrypt is going to cost a cool $24M in GPU alone. Most people concerned about this kind of attack are using a whole lot more chars. Apps should not be using MD5, use pbkdf2 or bcrypt.
评论 #40578832 未加载
评论 #40578816 未加载
lionkor11 个月前
I posted this below some comment but it may be worth reading for others:<p>start using very high entropy passwords which contain just about all printable ascii characters, excluding whitespace.<p>If a computer cant guess it, it won&#x27;t crack the hash, either.<p>Use a password manager and make those suckers 20-40 characters.<p>Use a master key that is just a super long phrase interleaved with special characters. Easy to remember. Like titles of books you like, plus authors, plus something only you know. Stuff like that. Example: `Franz&amp;Kafka$Meta-&#x2F;morphosis@@3385`. Even better, use such helpers to make a high entropy string of random letters.<p>I use a version of KeePass, with the actual file synced via syncthing to all devices plus a cloud. To me, it has never been an issue to copy paste or auto type a 40 character password -- in fact, I usually dont even notice.
Pesthuf11 个月前
Not quite as unrealistic as it seems - I have colleagues I can’t convince that SHA-256 is NOT good for passwords.<p>They just don’t understand that it’s safe for larger binaries, but absolutely not for short ASCII strings like passwords. Also they find it convenient since most modern programming languages and databases directly support those hash functions, but not something like bcrypt or Argon2.<p>So I do think there are many passwords out there you can crack easily and quickly nowadays.<p>I’ll try convincing them again…
评论 #40579041 未加载
skilled11 个月前
source,<p><a href="https:&#x2F;&#x2F;www.hivesystems.com&#x2F;blog&#x2F;are-your-passwords-in-the-green" rel="nofollow">https:&#x2F;&#x2F;www.hivesystems.com&#x2F;blog&#x2F;are-your-passwords-in-the-g...</a>
alanfranz11 个月前
Horrible article. You could crack md5 hashes in hours like 15 years ago. Nobody barely serious uses md5 for password derivation since long.
adverbly11 个月前
The label password is terrible. It implies that a single word is sufficient.<p>Something like secret or key would probably have been more appropriate in hindsight.
atmanactive11 个月前
By the way, I don&#x27;t understand how does password cracking work on a site&#x2F;system that has fail-to-ban?
评论 #40557580 未加载
评论 #40578767 未加载