Go Back   nV News Forums > Software Forums > Networking And Security

Newegg Daily Deals

Reply
 
Thread Tools
Old 04-01-10, 12:30 PM   #13
Bearclaw
Guest
 
Posts: n/a
Default Re: Any Ethical Hackers?



Book him, boys.
  Reply With Quote
Old 04-13-10, 11:21 PM   #14
snowmanwithahat
Snowy
 
snowmanwithahat's Avatar
 
Join Date: Jul 2004
Location: Michigan
Posts: 974
Default Re: Any Ethical Hackers?

Just an FYI on the CUDA thing..... Have a look at the results that I've gotten after adding the new card.

I am not overclocking this time so my GTX 285 score is slightly lower (and I think the 8x - 8x pci-e config is hurting it slightly from 16x).... overall though these are some pretty good results

Quote:
Running benchmark (23053.3 PMKs/s)... /

Computed 24288.70 PMKs/s total.
#1: 'CUDA-Device #1 'GeForce GTX 285'': 14037.1 PMKs/s (RTT 2.7)
#2: 'CUDA-Device #2 'GeForce 9800 GTX/9800 GTX+'': 6885.3 PMKs/s (RTT 2.9)
#3: 'CPU-Core (SSE2)': 788.6 PMKs/s (RTT 3.1)
#4: 'CPU-Core (SSE2)': 787.9 PMKs/s (RTT 3.0)
__________________
---Gaming Rig---
Q6600 3.4ghz (378x9) - 1.5v
Gigabyte EP45-UD3P
8gb (4x2gb) OCZ Gold DDR2-800 (5-4-4-12)
MSI+ASUS GTX 470 SLI
Dell u3011 IPS Display
HP 22" Auxiliary Monitor
256gb Western Digital Silicon Edge Blue SSD
5x2tb RAID-5 Array
750W PC P&C PSU
Windows 7 Pro 64-Bit & Ubuntu 10.04 64-bit

---Gaming Laptop---
ASUS G53JW
Core i7 740QM
16gb DDR3
Nvidia GTX 460m
1tb WD HDD
120gb Corsair SSD

Join the NvNews Folding @ Home Team
snowmanwithahat is offline   Reply With Quote
Old 04-13-10, 11:29 PM   #15
ViN86
 
Join Date: Mar 2004
Posts: 15,486
Default Re: Any Ethical Hackers?

Quote:
Originally Posted by snowmanwithahat View Post

There's a guy I've been talking to who's running a quad-GTX 295 server for cracking WPA passphrases. He's saying it's pushing 80,000 keys a second... Very impressive and realistic considering my GTX 285 which is extremely overclocked is putting ou 15,000 keys a second.
That's cool and all, but 80,000 isn't nearly enough.

If we have an 8 letter phrase with letters a-z and numbers 0-9, that's 36 characters. With 8 characters, we have 36^8 different keys. That's roughly 2.8E12. Divide that by 80,000 per second and we are looking at roughly 400 days.

And that's not even considering special characters (!,@,#,$,%,etc.) and different letter cases (a,A,b,B,etc.). Throw those in there and you're nowhere near cracking an 8 character key.

Of course I am talking about brute force. If you can make educated guesses (i.e. eliminate characters) then you will have a power law decay of required guesses. Also, again, I am talking about pure brute force decryption.
ViN86 is offline   Reply With Quote
Old 04-14-10, 09:39 AM   #16
snowmanwithahat
Snowy
 
snowmanwithahat's Avatar
 
Join Date: Jul 2004
Location: Michigan
Posts: 974
Default Re: Any Ethical Hackers?

Quote:
Originally Posted by ViN86 View Post
That's cool and all, but 80,000 isn't nearly enough.

If we have an 8 letter phrase with letters a-z and numbers 0-9, that's 36 characters. With 8 characters, we have 36^8 different keys. That's roughly 2.8E12. Divide that by 80,000 per second and we are looking at roughly 400 days.

And that's not even considering special characters (!,@,#,$,%,etc.) and different letter cases (a,A,b,B,etc.). Throw those in there and you're nowhere near cracking an 8 character key.

Of course I am talking about brute force. If you can make educated guesses (i.e. eliminate characters) then you will have a power law decay of required guesses. Also, again, I am talking about pure brute force decryption.
True, something most people don't realize is that bruteforcing is still impossible in a realistic time-frame. However.... until these video cards starting doing the work running a moderately sized wordlist was out of the question too, at least that is now an option.

I'd be somewhere around 2,900 PMK/sec without my videocards and 22,000+ with them. ~9x a performance increase is great, but not ground breaking.

I have heard though that 5870's are pushing 30,000 PMK/sec and pyrit is claiming with some new code that they can push into the 50,000 + range on a single card. If that's the case we're starting to see scaling to the point of making bruteforcing short passwords almost possible with a small cluster of servers. It wont be much more than a few years before we have the power to really make waves
__________________
---Gaming Rig---
Q6600 3.4ghz (378x9) - 1.5v
Gigabyte EP45-UD3P
8gb (4x2gb) OCZ Gold DDR2-800 (5-4-4-12)
MSI+ASUS GTX 470 SLI
Dell u3011 IPS Display
HP 22" Auxiliary Monitor
256gb Western Digital Silicon Edge Blue SSD
5x2tb RAID-5 Array
750W PC P&C PSU
Windows 7 Pro 64-Bit & Ubuntu 10.04 64-bit

---Gaming Laptop---
ASUS G53JW
Core i7 740QM
16gb DDR3
Nvidia GTX 460m
1tb WD HDD
120gb Corsair SSD

Join the NvNews Folding @ Home Team
snowmanwithahat is offline   Reply With Quote
Old 04-22-10, 04:50 PM   #17
ViN86
 
Join Date: Mar 2004
Posts: 15,486
Default Re: Any Ethical Hackers?

Quote:
Originally Posted by snowmanwithahat View Post
True, something most people don't realize is that bruteforcing is still impossible in a realistic time-frame. However.... until these video cards starting doing the work running a moderately sized wordlist was out of the question too, at least that is now an option.

I'd be somewhere around 2,900 PMK/sec without my videocards and 22,000+ with them. ~9x a performance increase is great, but not ground breaking.

I have heard though that 5870's are pushing 30,000 PMK/sec and pyrit is claiming with some new code that they can push into the 50,000 + range on a single card. If that's the case we're starting to see scaling to the point of making bruteforcing short passwords almost possible with a small cluster of servers. It wont be much more than a few years before we have the power to really make waves
Sorry I didn't notice your post above (#6) where you said exactly what I did.
ViN86 is offline   Reply With Quote
Old 04-23-10, 04:37 PM   #18
jcrox
Mahna Mahna
 
jcrox's Avatar
 
Join Date: Jul 2006
Location: Madison, Wi
Posts: 6,134
Default Re: Any Ethical Hackers?

Quote:
Originally Posted by snowmanwithahat View Post
Also... for those of you wondering about bruteforcing, atleast in the case of WPA, it's not possible.

lets look at the min character length password for example.

96 possible characters (upper, lower, special, numeric, space)
8 character length

that's 96^8 combinations.... or 7213895789838336 possibilities

Now assume my system.... it pushes through WPA passphrases at about 16,000 keys/sec... that means it'd only take 450868486864.896 seconds.... or 14,296.95 years.... So for the avergae user bruteforcing isn't an option, and picking a password that you wouldn't commonly find in a dictionary or intelligent wordlist is a huge help in securing your data.
For now this is true. If and when they make better use of GPGPU technology brute force hacking is going to be a totally different game
__________________

Gaming

MSI MPower Z87 | 4770k | CNPS9900MAX-B | 8GB G.Skill 1866 | EVGA GTX760 |ThermalTake 850w | X-Fi Titanium | HAF | Asus PA248Q | Lycosa | Death Adder | Win8 Pro 64

Dev/Backup

MSI GD65 | 2500k | H50 | 8GB G.skill | GTX570 | Ubuntu 13.10

Laptop

17" Inspiron | i5 | 4GB DDR3 | 500GB HDD | Win7 Pro 64

jcrox is offline   Reply With Quote
Reply


Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -5. The time now is 03:49 AM.


Powered by vBulletin® Version 3.7.1
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Copyright 1998 - 2014, nV News.