Ouroborus 
wrote: 
Pretty nice, but it seems you're still looking at around 120 years to crack a difficult 10 character password. But an eight character, case sensitive, alpha-numeric password should take less than two hours. 
01 Jan 2011 16:26 UTC 
mrb 
wrote: 
It is 57 years to crack all 10-char printable ASCII passwords with 4x5970 (95**10/33.1e9/3600/24/365.25 = 57.3 years). 
01 Jan 2011 18:19 UTC 
mr b 
wrote: 
how very exciting! i'll be sure and tell everyone who asks that you aren't the same mr b as I who can be found on twitter @veritaz 
06 Jun 2011 01:59 UTC 
Dennison Uy 
wrote: 
Why does it always have to be MD5? How does this perform on other standards like SHA-256? 
06 Jun 2011 09:25 UTC 
mrb 
wrote: 
Many applications with substandard password hashing algorithms (esp. web applications) hash passwords with MD5. So it became the de facto benchmark for password bruteforcers... 
06 Jun 2011 10:05 UTC 
Anon 
wrote: 
In real world SHA-256 performance the HD 5970 can do about 530-800MHash/second, depending on clock speed and other variables. 
06 Jun 2011 14:32 UTC 
mrb 
wrote: 
No, I have (unreleased) SHA-256 code (for Bitcoin) that runs at 1.1 Ghash/s on the 5970. 
06 Jun 2011 18:01 UTC 
ramon 
wrote: 
No comment. Just some questions. So you are using brute force and very fast GPUs to guess passwords. How does this work in the real world? Say I try to use this to guess a website access but the site will shut me out after the first three wrong guesses. What good is all that speed? What are the odds of guessing right in the first three tries? 
07 Jun 2011 12:16 UTC 
Jon L. 
wrote: 
Ramon, the point isn't to blindly guess at passwords, the point is to take a known MD5 hash and determine what the plaintext password is that created that hash. 
07 Jun 2011 15:22 UTC 
RayB 
wrote: 
So - the attacker must first have a list of hashes from the site - by hacking it or otherwise to know a hash whose password would work. Therein lies the rub. 
07 Jun 2011 16:34 UTC 
klmdb 
wrote: 
try running the program on one of these: 
09 Jun 2011 14:03 UTC 
mrb 
wrote: 
klmdb: I don't support Nvidia because they are much slower. The Tesla C2070 only does 1.4 Ghash/s with MD5. See http://www.golubev.com/gpuest.htm 
10 Jun 2011 06:15 UTC 
Greg B 
wrote: 
Ramon and Ray B: This isn't designed for hacking website passwords, such as to bust into yahoo mail accounts, pr0n sites, etc. This would be very effective at busting into password-protected data stores, such as USB keys or hard drives, where one physically had access to the medium. 
14 Jun 2011 21:18 UTC 
JodiTheTigger 
wrote: 
Mrb, care to share your unreleased bitcoin mining code? From what I can tell it's 50% faster than what is available. 
20 Jun 2011 21:40 UTC 
mrb 
wrote: 
It is not 50% faster. It is just a few percent faster than the best public code. Don't forget that 1 Bitcoin hash is defined as 2 SHA-256 hashes. My code does 569M Bitcoin hashes/s, or ~1.1G SHA-256 hashes/s on the HD 5970. 
21 Jun 2011 05:53 UTC 
Aaron 
wrote: 
Very, very cool. I'll definitely add this to my 'toolbox' when I build my desktop. Going to crossfire 2 Radeon 6790's (after flashing the bios to 6850, if I can), so I should be doing decently well with that. 
03 Jul 2011 00:59 UTC 
mywebs 
wrote: 
Would it make any difference if the MD5 hash also had a salt? When I use MD5 to hash a password I always use a sentence length salt that includes numbers and special chars to make sure a rainbow table can't be used.  
28 Jul 2011 19:21 UTC 
mrb 
wrote: 
As you point out, salts are only useful to prevent pre-computed attacks. For the purpose of bruteforcing, a salt does not typically significantly slow down attacks. 
29 Jul 2011 04:59 UTC 
db 
wrote: 
your program is much, much slower than oclHashcat. i have 4x 5970s and single hash raw MD5 performance with oclHascat-lite is ~ 49.2 G/s. step it up! 
16 Aug 2011 12:27 UTC 
mrb 
wrote: 
I know. One of my goals when releasing whitepixel was to entice competition between different tools. At first, oclhashcat users in the IRC channels could not believe my results, said I cheated by using a simplistic charset, etc. Now look at how fast oclhashcat is. I succeeded :-) 
17 Aug 2011 05:24 UTC 
klo 
wrote: 
Are you going to release a new faster version?? 
22 Aug 2011 13:42 UTC 
Peter 
wrote: 
Nice and impressive. But all my login code has a preset time interval for login attempts. In other words, you can try a password only every 'n' seconds. 
01 Sep 2011 00:03 UTC 
mrb 
wrote: 
Peter, my tool runs an offline attack. It is not subject to settings controlling the maximum number of login attempts. 
02 Sep 2011 03:04 UTC 
m3g9tr0n 
wrote: 
Hi Marc! 
16 Nov 2011 09:04 UTC 
Ahmad 
wrote: 
Can the code of whitepixel be modified to work with SHA-256? 
17 Nov 2011 14:50 UTC 
mrb 
wrote: 
The official AMD doc on CAL is what I used to learn. 
18 Nov 2011 01:40 UTC 
m3g9tr0n 
wrote: 
Thanks Marc for your reply! 
24 Nov 2011 17:59 UTC 
mrb 
wrote: 
No. It seems calseum would be rendered obsolete by OpenCL... 
24 Nov 2011 18:11 UTC 
Mr T, who is much more smart than you 
wrote: 
well MY website has rayguns and mutant porno lizards in jackboots that throw monkey poop at anyone who enters two wrong passwords in a row, so your code is crap. useless crap. 
22 Jan 2012 08:57 UTC 
TV 
wrote: 
Hi Marc,   
09 Mar 2012 04:06 UTC 
mrb 
wrote: 
Not a chance. ARM platforms do not even support graphics cards made for x86 PCs. 
09 Mar 2012 09:32 UTC 
Simon Zerafa 
wrote: 
Hi, 
07 Apr 2012 12:17 UTC 
mrb 
wrote: 
Simon, no, however 6990 performance numbers with oclhashcat-plus can be found here: http://hashcat.net/oclhashcat-plus/ 
21 Apr 2012 08:49 UTC 
Dawn White 
wrote: 
I'm just trying to get my brain around calculating how long it would take such a rig using 4xHD 5970 units to crack WPA/WPA2 router passwords.  For example many Thomson, VirginMedia routers use 8 lowercase characters.  SKY routers on the older models use 8 uppercase.  So I am talking about grabbing the 4-way handshake and then running say pyrit, aircrack-ng using dictionaries or using crunch to brute force.  Any clarifications would be much appreciated as I am trying to either build a rig myself or buy one off the shelf.  I know the hashcat team won some benchmark contests about a year ago, does anyone have an idea of the best price/performance rigs out there which would crack 8 symbol alph-numerics and ideally 10 symbol too as many newer routers are using 10 alpha-numeric symbols.  Any links or advise is much appreciated. 
17 Mar 2014 23:47 UTC 
Dawn White 
wrote: 
Addendum to earlier post. re: WPA/WPA2 pw cracking.  Just to be more precise, I mean crack 8 symbol alphanumeric passwords in a reasonable time lets say a few hours or a few days. 
18 Mar 2014 00:01 UTC 
mrb 
wrote: 
Dawn White: I have no benchmark numbers for the HD5970, but I know that with a 8 x R9 290X rig, oclhashcat bruteforces WPA2 at 1.34M c/s. This means 8 alphabetic characters passwords can be attacked in 43 hours, 8 alphanumeric in 24 days, and 10 alphabetic in 3.3 years. 
22 Mar 2014 06:12 UTC 
Jim 
wrote: 
An EXTREMELY simple and effective password system is available to chess players (of sufficient skill) Using the first 5 move pairs of a common or favorite chess opening in algebraic notation has too many possibilities for brute force hacking. Just adding a simple word to the end of the string obviates loading an opening encyclopedia for searching example: 
30 Jan 2016 14:37 UTC 
burak 
wrote: 
3b22bcf1dd25a1f8cd61fb2d0ac61027 
09 Nov 2016 13:24 UTC