top | item 4897290

25-GPU cluster cracks every standard Windows password in less than 6 hours

113 points| rayval | 13 years ago |arstechnica.com | reply

70 comments

order
[+] peteretep|13 years ago|reply
Less good against non-NTLM passwords ... from my comment last time:

Taking SHA-1 (which YOU MUST NOT USE for password hashing blah), it only manages 63 billion a second. To try all the passwords for that in the alphanumeric space:

- 10 chars: 35 weeks

- 11 chars: 44 years

- 12 chars: 2,800 years

- 16 chars: 11 times the age of the sun

10 chars for bcrypt: 600,000 years...

http://www.wolframalpha.com/input/?i=%2865**16+%2F+63+billio...

[+] joshmaker|13 years ago|reply
- 8 chars: 84 minutes

- 6 chars: 1.2 seconds

All of which demonstrates the importance of requiring longer passwords. Also, keep in mind that these are maximum times required to crack a password and not the average times.

[+] 16s|13 years ago|reply
NTLM hashes are stored in Active Directory servers as one round of unsalted MD4. It's plain MD4. Not many people know this and I only point it out as it's important to understand that when talking about how many cracks per second they are getting.
[+] cynwoody|13 years ago|reply
Impressive as the numbers are, it's worth remembering that this is an "offline crack", going against a stolen list of encrypted passwords. If they can steal your database of encrypted passwords, you've got a problem no matter how strong the passwords are.

How many guesses per second do you get in a typical online crack? E.g., a script kiddie trying to guess your cloud server's SSH password?

[+] ramidarigaz|13 years ago|reply
On my webserver, you get 3 chances and then a 24 hour ip ban. I think that comes out to 0.00003 passwords per second :)

The particularly persistent IPs get a special iptables rule.

[+] mitchi|13 years ago|reply
These hash functions are made to be fast to hash :P Check out the NIST competition, they picked the fastest hash that can be calculated with special hardware :) People who want real offline password security should use slow hash functions (and passphrases of course).
[+] plaguuuuuu|13 years ago|reply
it's my understanding that NTLM hashes are sent over the wire...? therefore any machine on the local network could intercept this hash via network-level attacks such as ARP poisoning, WiFi attacks, etc. Then the cracking box would quite happily and easily brute force the entire 8 char keyspace and reveal the pass.

it's a different threat model to hash+email retrieval via sql injection which can lead to all sorts of nastiness involving hijacking email and then other accts

[+] madao|13 years ago|reply
I remember back when I was doing a network engineering course the guys could crack a windows password in minutes offline, simple matter of grabbing the database from the machine. I think once you have the machine offline unless you encrypt the data your pretty screwed regardless..
[+] Blara|13 years ago|reply
When was this? I know older windows versions stored passwords in plain text... I can't remember when they switched to hashed passwords but I think it was around XP or Vista
[+] ChrisNorstrom|13 years ago|reply
Guess what? Back in 2009, I started using a method to remember long passwords with a huge # of letters, numbers, & special characters.

Gw?Bi2009Isuamtrlpwah#ol,n,&sc. (31 characters)

Create memorable sentences and create a password using the first letter of each word & all the numbers and punctuation. After entering it 10 or so times you'll get used to it pretty quickly.

[+] phpnode|13 years ago|reply
or you can literally write the whole sentence, which is even more secure and you don't have to remember any special rules, just the sentence itself. Of course it's more typing:

    Guess what? Back in 2009 I saw a uniquely attired man traipsing round local places with a high number of legs, necks and shirt collars.
136 characters or 14 Gigayears to crack. Wow today I learnt that there's such a thing as a Gigayear.
[+] rjempson|13 years ago|reply
I'm not sure there is much significance to this article.

It points out "The technique doesn't apply to online attacks, because, among other reasons, most websites limit the number of guesses that can be made for a given account."

Same applies to Windows.

[+] ramblerman|13 years ago|reply
I think what they're referring to is having access to the physicial harddisk. In linux terms it would equate to having a copy of the /etc/passwd file.

For example the FBI seizes someones computer. This would allow them to brute force without said restriction.

So yes, from an online, or standard entry viewpoint this is a moot point. Also a properly encrypted hard drive using something like truecrypt is still pretty impenetrable regardless.

[+] jasonwatkinspdx|13 years ago|reply
Offline attacks matter. The last few years have seen a continuous stream of high profile account database leaks. There are now some 1 billion known real user selected passwords that are readily downloaded from any of a number of shady sites.

It is irrational to assume that password database leaks won't continue.

The hashing scheme and salting matters less and less, as the total entropy humans can conveniently recall is quite limited and moore's law keeps marching.

We need a fundamental rethinking of security and identity on the internet, and IMHO the OSS world needs to get there before partisan commercial interestes.

[+] rjempson|13 years ago|reply
Thinking about it some more. Is the only practical exploit of this the case where a rogue sysadmin wants to figure out user passwords (without resetting the password and therefore alerting the user)?
[+] pserwylo|13 years ago|reply
I disagree. If a website gets hacked and its customer database is stolen, then this could be used to crack the user passwords.
[+] rayval|13 years ago|reply
Edited title for length, because original title got truncated in a confusing fashion.

Original title: "25-GPU cluster cracks every standard Windows password in <6 hours"

[+] rayval|13 years ago|reply
Looks like that got fixed by sysop gods. Thanks!
[+] patrickgzill|13 years ago|reply
If this is done with commodity hardware, now, what were the NSA's capabilities even 5 years ago?
[+] apawloski|13 years ago|reply
For comparison, a couple weeks ago Oak Ridge National Laboratory's Titan computer topped the Top500 list for fastest supercomputer in the world (although that title is a bit misleading). Here's the specs on Titan:

18,688 AMD Opteron 6274 16-core CPUs

18,688 Nvidia Tesla K20 GPUs

17.59 petaflops

Titan displaced Sequoia (at Lawrence Livermore National Laboratory) from the top spot on Top500. Interestingly enough, Sequoia uses a very different architecture, based on 16-core PowerPC A2 nodes rather than GPUs. Sequoia also has about 1.6PB of memory, while Titan "only" has 1PB.

Both computers have reasonably different use cases. GPUs are great for embarrassingly parallel, non-memory intensive tasks like brute forcing passwords. But all of the rumors about the NSA's massive data analysis needs suggests that they may need a cluster that resembles Sequoia (with fewer cores, but larger caches and available memory) more than Titan.

[+] SenorWilson|13 years ago|reply
I'm sure they were able to crack the encryption method before Microsoft started using it.
[+] muyuu|13 years ago|reply
I wouldn't call a big cluster of commodity hardware simply commodity hardware because then many of the top supercomputers of the world are commodity hardware.

The combination is exotic enough to be considered non-commodity hardware.

[+] jiggy2011|13 years ago|reply
So , why don't modern versions of Windows just use Bcrypt or similar for passwords?
[+] iamchrisle|13 years ago|reply
Nice. But can it run Crysis?
[+] rtkwe|13 years ago|reply
Yes. Physically, it's running *nix though so you'd have to get windows to not freak out with all that power.
[+] recoiledsnake|13 years ago|reply
Every standard Windows password less than 8 chars only?
[+] apawloski|13 years ago|reply
I know for practical purposes this doesn't seem like that big of a deal, but you have to understand that 8 chars of mixed case, numbers, and symbols is still a gigantic key space. That this can be done so quickly on commodity hardware is pretty impressive.
[+] jiggy2011|13 years ago|reply
Some versions of Windows (XP and lower I believe?) would split long passwords into 2 hashes, effectively allowing them to be cracked in parallel.