Vulnerabilities / Threats
8/16/2010
01:37 PM
50%
50%

Passwords Quickly Hacked With PC Graphics Cards

Georgia Tech researchers find that high-end, readily available graphics processing units are powerful enough to easily crack secret codes.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
Passwords with fewer than 12 characters can be quickly brute-force decoded using a PC graphics processing unit (GPU) that costs just a few hundred dollars, according to researchers at the Georgia Institute of Technology.

"We've been using a commonly available graphics processor to test the integrity of typical passwords of the kind in use here at Georgia Tech and many other places," said Richard Boyd, a senior research scientist at the university's research institute, in a statement. "Right now we can confidently say that a seven-character password is hopelessly inadequate."

Today's top graphics processors offer about two teraflops of parallel processing power. For comparison, "in the year 2000, the world's fastest supercomputer, a cluster of linked machines costing $110 million, operated at slightly more than 7 teraflops," he said.

The barrier to using multi-core graphics processors -- available from Nvidia or AMD's ATI division -- for compute-intensive processes other than graphics processing, said Boyd, first fell in 2007, when Nvidia released a C-based software development kit. "Once Nvidia did that, interest in GPUs really started taking off," he said. "If you can write a C program, you can program a GPU now." Or use it to crack a password.

Furthermore, thanks to Moore's Law, graphics processors continue to increase in power, which means that GPUs will get better, not worse, at cracking passwords.

But who needs a graphics processor? People often create and rely on simple passwords, and many websites use passwords more for psychological than security purposes.

But the Georgia Tech research underscores the importance of getting people to adopt longer, non-simple passwords to make them safer against attack. "Length is a major factor in protecting against 'brute forcing' a password," according to one research scientist involved in the project, Joshua Davis. "A computer keyboard contains 95 characters, and every time you add another character, your protection goes up exponentially, by 95 times."

For the record, to defend against GPU attacks, the password researchers recommend using sentence-length passwords that mix letters with numbers or symbols, and which are at least 12 characters long.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1241631011972
50%
50%
ANON1241631011972,
User Rank: Apprentice
11/1/2011 | 6:35:42 PM
re: Passwords Quickly Hacked With PC Graphics Cards
I think this article overstates the capabilities and the use case does not generally exist in the real world. Passwords do not exist in a cyberspace vacuum, just waiting to be attacked in isolation. They exist in combination with a user identifier and a challenge/response system behind a UI. While the brute force methods may be capable of generating all the possible combinations, they still have to test them against a validation challenge with the correct response set. Most password challenge systems have two additional inhibitors against brute force attacks: 1. They don't respond at GPU speeds 2. They usually disable the account after 3 to 5 failed attempts. So, unless the brute force program has the password database available and the appropriate decode algorithms to provide the correct challenge/response patterns, it will not succeed. If the attacker has that kind of access, he or she is already past the firewall and well into the bowels of the network.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.