Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Passwords Quickly Hacked With PC Graphics Cards

Georgia Tech researchers find that high-end, readily available graphics processing units are powerful enough to easily crack secret codes.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
Passwords with fewer than 12 characters can be quickly brute-force decoded using a PC graphics processing unit (GPU) that costs just a few hundred dollars, according to researchers at the Georgia Institute of Technology.

"We've been using a commonly available graphics processor to test the integrity of typical passwords of the kind in use here at Georgia Tech and many other places," said Richard Boyd, a senior research scientist at the university's research institute, in a statement. "Right now we can confidently say that a seven-character password is hopelessly inadequate."

Today's top graphics processors offer about two teraflops of parallel processing power. For comparison, "in the year 2000, the world's fastest supercomputer, a cluster of linked machines costing $110 million, operated at slightly more than 7 teraflops," he said.

The barrier to using multi-core graphics processors -- available from Nvidia or AMD's ATI division -- for compute-intensive processes other than graphics processing, said Boyd, first fell in 2007, when Nvidia released a C-based software development kit. "Once Nvidia did that, interest in GPUs really started taking off," he said. "If you can write a C program, you can program a GPU now." Or use it to crack a password.

Furthermore, thanks to Moore's Law, graphics processors continue to increase in power, which means that GPUs will get better, not worse, at cracking passwords.

But who needs a graphics processor? People often create and rely on simple passwords, and many websites use passwords more for psychological than security purposes.

But the Georgia Tech research underscores the importance of getting people to adopt longer, non-simple passwords to make them safer against attack. "Length is a major factor in protecting against 'brute forcing' a password," according to one research scientist involved in the project, Joshua Davis. "A computer keyboard contains 95 characters, and every time you add another character, your protection goes up exponentially, by 95 times."

For the record, to defend against GPU attacks, the password researchers recommend using sentence-length passwords that mix letters with numbers or symbols, and which are at least 12 characters long.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1241631011972
50%
50%
ANON1241631011972,
User Rank: Apprentice
11/1/2011 | 6:35:42 PM
re: Passwords Quickly Hacked With PC Graphics Cards
I think this article overstates the capabilities and the use case does not generally exist in the real world. Passwords do not exist in a cyberspace vacuum, just waiting to be attacked in isolation. They exist in combination with a user identifier and a challenge/response system behind a UI. While the brute force methods may be capable of generating all the possible combinations, they still have to test them against a validation challenge with the correct response set. Most password challenge systems have two additional inhibitors against brute force attacks: 1. They don't respond at GPU speeds 2. They usually disable the account after 3 to 5 failed attempts. So, unless the brute force program has the password database available and the appropriate decode algorithms to provide the correct challenge/response patterns, it will not succeed. If the attacker has that kind of access, he or she is already past the firewall and well into the bowels of the network.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10694
PUBLISHED: 2019-12-12
The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password. If they do not use that URL, there is an overlooked default password for the admin user. This was resolved in Puppet Enterprise 2019.0.3 and 2018.1....
CVE-2019-10695
PUBLISHED: 2019-12-12
When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user�s username and password were exposed in the job�s Job Details pane in the PE console. These issues have been resolved in version 1.2.1 of the ...
CVE-2019-5085
PUBLISHED: 2019-12-12
An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability.
CVE-2019-5090
PUBLISHED: 2019-12-12
An exploitable information disclosure vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an out-of-bounds read, resulting in information disclosure. An attacker can send a packet to trigger this vulner...
CVE-2019-5091
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability.