Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month, online, via Jitsi Meet.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] deadmanish login?



On 2/5/2017 11:47 AM, Kent Borg wrote:
> Do some arithmetic.

I'll do you one better and provide actual performance numbers:

~127 GH/s NTLM = Benchmark cracking speed i.e. 127 billion cracks per second
~26 GH/s SHA1 = Benchmark cracking speed i.e. 26 billion cracks per second
~31 MH/s md5crypt = Benchmark cracking speed i.e. 31 million cracks per
second

That's for a cheap, entry level Hashcat rig. A high end rig with 8x GTX
1080 GPUs can do, well, see for yourself:
https://gist.github.com/epixoip/a83d38f412b4737e99bbef804a270c40

As for how would someone use one (or five, or a dozen) of these to
attack your password algorithm? Hashcat combinator attack is how:
https://hashcat.net/wiki/doku.php?id=combinator_attack

-- 
Rich P.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org