TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

25-GPU cluster cracks every standard Windows password in less than 6 hours

113 点作者 rayval超过 12 年前

13 条评论

peteretep超过 12 年前
Less good against non-NTLM passwords ... from my comment last time:<p>Taking SHA-1 (which YOU MUST NOT USE for password hashing blah), it only manages 63 billion a second. To try all the passwords for that in the alphanumeric space:<p>- 10 chars: 35 weeks<p>- 11 chars: 44 years<p>- 12 chars: 2,800 years<p>- 16 chars: 11 times the age of the sun<p>10 chars for bcrypt: 600,000 years...<p><a href="http://www.wolframalpha.com/input/?i=%2865**16+%2F+63+billion%29+seconds" rel="nofollow">http://www.wolframalpha.com/input/?i=%2865**16+%2F+63+billio...</a>
评论 #4898814 未加载
评论 #4898137 未加载
jwilliams超过 12 年前
This was discussed 3-4 days ago: <a href="http://news.ycombinator.com/item?id=4875206" rel="nofollow">http://news.ycombinator.com/item?id=4875206</a><p>Upshot - it's impressive, but NTLM already known as an vulnerable target.
16s超过 12 年前
NTLM hashes are stored in Active Directory servers as one round of unsalted MD4. It's plain MD4. Not many people know this and I only point it out as it's important to understand that when talking about how many cracks per second they are getting.
cynwoody超过 12 年前
Impressive as the numbers are, it's worth remembering that this is an "offline crack", going against a stolen list of encrypted passwords. If they can steal your database of encrypted passwords, you've got a problem no matter how strong the passwords are.<p>How many guesses per second do you get in a typical online crack? E.g., a script kiddie trying to guess your cloud server's SSH password?
评论 #4897551 未加载
评论 #4897629 未加载
评论 #4897640 未加载
madao超过 12 年前
I remember back when I was doing a network engineering course the guys could crack a windows password in minutes offline, simple matter of grabbing the database from the machine. I think once you have the machine offline unless you encrypt the data your pretty screwed regardless..
评论 #4897881 未加载
ChrisNorstrom超过 12 年前
Guess what? Back in 2009, I started using a method to remember long passwords with a huge # of letters, numbers, &#38; special characters.<p>Gw?Bi2009Isuamtrlpwah#ol,n,&#38;sc. (31 characters)<p>Create memorable sentences and create a password using the first letter of each word &#38; all the numbers and punctuation. After entering it 10 or so times you'll get used to it pretty quickly.
评论 #4898547 未加载
rjempson超过 12 年前
I'm not sure there is much significance to this article.<p>It points out "The technique doesn't apply to online attacks, because, among other reasons, most websites limit the number of guesses that can be made for a given account."<p>Same applies to Windows.
评论 #4897865 未加载
评论 #4898260 未加载
评论 #4897858 未加载
评论 #4897983 未加载
rayval超过 12 年前
Edited title for length, because original title got truncated in a confusing fashion.<p>Original title: "25-GPU cluster cracks every standard Windows password in &#60;6 hours"
评论 #4897677 未加载
patrickgzill超过 12 年前
If this is done with commodity hardware, now, what were the NSA's capabilities even 5 years ago?
评论 #4897423 未加载
评论 #4897374 未加载
评论 #4898580 未加载
jiggy2011超过 12 年前
So , why don't modern versions of Windows just use Bcrypt or similar for passwords?
iamchrisle超过 12 年前
Nice. But can it run Crysis?
评论 #4897605 未加载
recoiledsnake超过 12 年前
Every standard Windows password less than 8 chars only?
评论 #4897458 未加载
评论 #4898816 未加载
namank超过 12 年前
How bout SSL?