Tools & TutorialsLOW

GPU Password Cracking - Specops Analyzes Performance Limits

Featured image for GPU Password Cracking - Specops Analyzes Performance Limits
#NVIDIA#Hashcat#Specops#password cracking#AI GPU

Original Reporting

BCBleepingComputer·Sponsored by Specops Software

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelLOW

Low severity — routine development or informational update

🔧
🔧 TOOL OVERVIEW
Tool NameHashcat
Developer/OrganizationOpen Source
CategoryPassword Recovery Tool
LicenseOpen Source
PlatformCross-Platform
Language/FrameworkC
GitHub Stars
Key CapabilityPassword Hash Cracking
Integrations
🎯

Basically, a $30,000 GPU isn't better than cheaper ones for cracking passwords.

Quick Summary

Specops reveals that a $30,000 GPU isn't superior for password cracking. In fact, consumer GPUs outperform them, highlighting the need for strong password policies.

What Happened

In a recent analysis by Specops Software, researchers explored whether high-end AI GPUs, specifically the Nvidia H200 and AMD MI300X, could outperform consumer GPUs like the Nvidia RTX 5090 in password cracking. Despite the hefty price tag of $30,000 for the AI GPUs, the results showed that they lagged behind the RTX 5090 in cracking speed across multiple hashing algorithms.

Setting Up the Test

The Specops team utilized Hashcat, a popular password recovery tool, to benchmark the performance of different GPUs against five common hashing algorithms: MD5, NTLM, bcrypt, SHA-256, and SHA-512. These algorithms represent a range of complexities, from older, easier-to-crack hashes to modern, more secure ones.

GPU Password Cracking Results

The results were striking. The RTX 5090 outperformed both AI accelerators in every category:

  • MD5: RTX 5090 at 219.5 GH/s, H200 at 124.4 GH/s, MI300X at 164.1 GH/s
  • NTLM: RTX 5090 at 340.1 GH/s, H200 at 218.2 GH/s, MI300X at 268.5 GH/s
  • bcrypt: RTX 5090 at 304.8 kH/s, H200 at 375.3 kH/s, MI300X at 142.3 kH/s
  • SHA-256: RTX 5090 at 27681.6 MH/s, H200 at 15092.3 MH/s, MI300X at 24673.6 MH/s
  • SHA-512: RTX 5090 at 10014.2 MH/s, H200 at 5173.6 MH/s, MI300X at 8771.4 MH/s

The analysis revealed that the RTX 5090 not only surpassed the H200 but did so at a fraction of the cost, raising questions about the necessity of such expensive hardware for password cracking.

The Real Risk to Organizations

The findings highlight a critical concern: password cracking doesn't require exotic hardware. Attackers can easily access sufficient computing power to brute-force weak passwords. For instance, a password hashed with SHA-256 could be cracked in just 21 hours if it’s not complex enough.

The real danger lies in reused passwords from data breaches. If an attacker can link exposed credentials to an individual, they can attempt those passwords against corporate accounts, leading to potential breaches.

How Specops Helps

Specops offers tools to help organizations manage password security effectively:

  • Granular Password Policy Management: Implement detailed password policies that exceed standard Active Directory settings, ensuring compliance and encouraging strong password creation.
  • Continuous Scanning for Breached Passwords: Their solution scans Active Directory against a database of over 5 billion compromised passwords, alerting users to potential risks.

Organizations should not rely solely on passwords for security. Implementing multi-factor authentication (MFA) can provide an essential additional layer of protection against credential theft.

Conclusion

In conclusion, while the latest AI GPUs are impressive in their capabilities, they do not provide a significant advantage in password cracking compared to consumer GPUs. Organizations must focus on enforcing strong password policies and utilizing tools to detect compromised passwords to better protect against potential breaches.

🔍 How to Check If You're Affected

  1. 1.Implement strong password policies requiring complex passwords.
  2. 2.Use tools to monitor for compromised passwords within your organization.
  3. 3.Educate employees on the risks of password reuse across different platforms.

🏢 Impacted Sectors

TechnologyFinanceEducation

Pro Insight

🔒 Pro insight: This analysis underscores the importance of robust password policies over reliance on expensive hardware for security.

Sources

Original Report

BCBleepingComputer· Sponsored by Specops Software
Read Original

Related Pings

MEDIUMTools & Tutorials

Secrets Detection - Integrating It into Your Security Workflow

Secrets detection is essential for modern security workflows. It helps identify leaked credentials across various platforms. Organizations must implement automated validation to enhance their defenses.

SC Media·
LOWTools & Tutorials

Secureframe - Launches User Access Reviews for Governance

Secureframe has launched User Access Reviews, automating access validation for organizations. This new feature enhances security governance and streamlines compliance efforts, reducing manual workload. It's a game-changer for audit readiness and accountability.

Help Net Security·
MEDIUMTools & Tutorials

Automated Pentesting - Why It's Not Enough for Security

Join today's webinar to learn why automated pentesting tools may not be enough for comprehensive security validation and how to address hidden vulnerabilities.

SecurityWeek·
MEDIUMTools & Tutorials

Acronis MDR Launch - 24/7 Managed Detection for MSPs

Acronis has launched a new 24/7 managed detection and response service tailored for MSPs, enhancing their security capabilities and operational efficiency.

Help Net Security·
LOWTools & Tutorials

Detection Engineering - Correlation Techniques Explained

The latest installment in the detection foundation series focuses on correlation techniques in security. Learn how to connect Windows logs and Sysmon data for better incident response. This is crucial for identifying suspicious activities and enhancing your security posture.

TrustedSec Blog·
LOWTools & Tutorials

PortSwigger - Partners with Meta for Bug Bounty Training

PortSwigger teams up with Meta to boost bug bounty training. This partnership equips bug hunters with tools and education for better vulnerability detection. Join the community today!

PortSwigger Blog·