{"id":837,"date":"2010-03-18T16:26:30","date_gmt":"2010-03-18T09:26:30","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=837"},"modified":"2010-03-18T16:26:30","modified_gmt":"2010-03-18T09:26:30","slug":"cracking-at-300-billion-passwords-per-second","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2010\/03\/cracking-at-300-billion-passwords-per-second\/","title":{"rendered":"Cracking at 300 billion passwords per second"},"content":{"rendered":"<p>Password-cracking tools optimised to work with SSDs have achieved speeds up to 100 times quicker than previously possible.<\/p>\n<p>After optimising its rainbow tables of password hashes to make use of SSDs Swiss security firm Objectif S\u00e9curit\u00e9 was able to crack 14-digit WinXP passwords with special characters in just 5.3 seconds. Objectif S\u00e9curit\u00e9&#8217;s Philippe Oechslin told Heise Security that the result was 100 times faster than possible with their old 8GB Rainbow Tables for XP hashes.<\/p>\n<p><!--more--><\/p>\n<p>The exercise illustrated that the speed of hard discs rather than processor speeds was the main bottleneck in password cracking based on password hash lookups.<\/p>\n<p>Objectif&#8217;s test rig featured an ageing Athlon 64 X2 4400+ with an SSD and optimised tables containing 80GB of password hashes. The system supports a brute force attack of 300 billion passwords per second, and is claimed to be 500 times faster than a password cracker from Russian firm Elcomsoft that takes advantages of the number crunching prowess of a graphics GPU from NVIDIA.<\/p>\n<p>Check the <a href=\"https:\/\/www.objectif-securite.ch\/en\/products.php#demo\" target=\"_blank\">Online demo<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Password-cracking tools optimised to work with SSDs have achieved speeds up to 100 times quicker than previously possible. After optimising its rainbow tables of password hashes to make use of&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[62,95,96],"class_list":["post-837","post","type-post","status-publish","format-standard","hentry","category-security","tag-cracking","tag-rainbow-tables","tag-ssd"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-dv","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=837"}],"version-history":[{"count":1,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/837\/revisions"}],"predecessor-version":[{"id":838,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/837\/revisions\/838"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}