Cluster with 25 GPUs sprayed passwords LM / NTLM Windows
In the last event Passwords ^ 12 Security Conference, held a demonstration of a cluster consisting of four 4U rackmount servers equipped with a total of 18 video cards (11 + 7 dual GPU single GPU) in the arduous task of breaking passwords using brute force attacks.
- A server with 10 Radeon HD 7970 (10 GPUs).
- A server with four Radeon HD 5970 (8 GPUs).
- A server with 3 cards Radeon HD 6990 (6 GPUs).
- A server with a Radeon HD 5870 (1 GPU).
To operate all together GPUs used a technology called Virtual OpenCL (VCL), which allows multiple GPUs using the network as if they were all installed on a local computer, allowing you to use their combined computing power under the API GPGPU OpenCL 1.1 on a modified version of the utility oclHashCat.
With this computing power, performed a brute force attack generates hash 348 billion passwords per second, achieving break in about 5.5 hours a user password (8 characters) windows (NTLM), and just 6 minutes break user passwords (14 characters) Windows (LM authentication used in Windows 2003/XP and below).
Link: A 25-GPU Monster Cracks Passwords in OpenCL (Geeks3D)Tags: 2.5 ", 4U, amd, cluster, crack, GPGPU, GPUs, hash, oclHashCat, OpenCL, password, rack, Radeon, Security, server, VCL, Virtual OpenCL, windows