«
Expand/Collapse
26 items tagged "gpu"
Related tags:
hacks [+],
crackers [+],
advanced [+],
utility [+],
sha1 [+],
md4 [+],
mask [+],
wpa database [+],
thomas ryan tags [+],
security [+],
ring of death [+],
performance implementations [+],
password [+],
parallel architecture [+],
gpus [+],
fermi [+],
cloud [+],
virtual currency [+],
virtual [+],
vijay [+],
veronica [+],
rrod [+],
reuben [+],
research students [+],
repair [+],
rbz [+],
quinn dunki [+],
processing [+],
powerful graphics [+],
power [+],
pixel [+],
music [+],
modern electronics [+],
mints [+],
microcontrollers [+],
memory corruption [+],
malware [+],
machine [+],
linux kernel [+],
linux [+],
limiting factor [+],
leveraging [+],
laptops [+],
laptop [+],
interfacing [+],
heat conductivity [+],
heat [+],
graphics processing unit [+],
graphics card [+],
google [+],
georgia tech [+],
fractals [+],
failure point [+],
death [+],
creating music [+],
creating [+],
cracking passwords [+],
cpu [+],
correct password [+],
computer [+],
command line tool [+],
chrome [+],
buffer memory [+],
Programming [+],
Hardware [+],
hash [+],
oclhashcat [+],
dictionary [+]
-
-
5:01
»
Hack a Day
[Quinn Dunki] pulled together many months worth of work by interfacing her GPU with the CPU. This is one of the major points in her Veronica project which aims to build a computer from the ground up. We’ve seen quite a number of posts from her regarding the AVR-powered GPU. So far the development of [...]
-
-
16:01
»
Hack a Day
Powerful graphics cards are pretty affordable these days. Even though we rarely do high-end gaming on our daily machine we still have a GeForce 9800 GT. That goes to waste on a machine used mainly to publish posts and write code for microcontrollers. But perhaps we can put the GPU to good use when it comes [...]
-
-
12:54
»
SecDocs
Authors:
Thomas Ryan Tags:
cracking Event:
Black Hat DC 2011 Abstract: It has been known since some time now that the massive parallel architecture of modern GPUs provide enormous acceleration when trying to break encryption- or hashalgorithms: GPUs are (depending on the algorithm and the implementation) some hundred times faster compared to standard quad core CPUs when it comes to brute forcing SHA1 and MD5. The enormous potential can also be seen in the supercomputing business: The Tianhe-1A, leader of the top 500 list of supercomputers, is not only equipped with 14.336 CPUs but also with 7.168 NVIDIA Tesla "Fermi" M2050 GPUs - each of which has 448 cores and 3GB RAM. Until recently, one needed to spend a lot of money to get a small cluster of GPU assisted servers, but Amazon now provides an instance type in it's EC2 cloud that sports two of the GPUs that are also used in the Tianhe-1A, resulting in a cheap way to boot up a cluster of GPU accelerated servers that can be used for own purposes. The first part of the talk will be about the design and the implementation of a massive parallel and GPU assisted environment for breaking encryptions: From generation, the storing and the use of rainbow tables to brute forcing in the cloud. In the second part of the talk the "Cloud Cracking Suite" is introduced: An open source suite designed to demonstrate the performance of breaking several algorithms in the cloud. The 'Cloud Cracking Suite' is splitted in two parts: The server side and the client. The server side consists of especially for the Fermi-architecture optimized, high performance implementations of SHA1 and MD5 with an interface to use them for rainbow table generation or brute forcing as well as a self-configuring Pyrit for WPA database generation. The client side provides an easy to use CLI which allows one to spawn and control a cluster for a specific task. As the server side will be available as a hosted AMI, everyone participating can simply download the client, create an account at the AWS and try it out himself.
-
12:54
»
SecDocs
Authors:
Thomas Ryan Tags:
cracking Event:
Black Hat DC 2011 Abstract: It has been known since some time now that the massive parallel architecture of modern GPUs provide enormous acceleration when trying to break encryption- or hashalgorithms: GPUs are (depending on the algorithm and the implementation) some hundred times faster compared to standard quad core CPUs when it comes to brute forcing SHA1 and MD5. The enormous potential can also be seen in the supercomputing business: The Tianhe-1A, leader of the top 500 list of supercomputers, is not only equipped with 14.336 CPUs but also with 7.168 NVIDIA Tesla "Fermi" M2050 GPUs - each of which has 448 cores and 3GB RAM. Until recently, one needed to spend a lot of money to get a small cluster of GPU assisted servers, but Amazon now provides an instance type in it's EC2 cloud that sports two of the GPUs that are also used in the Tianhe-1A, resulting in a cheap way to boot up a cluster of GPU accelerated servers that can be used for own purposes. The first part of the talk will be about the design and the implementation of a massive parallel and GPU assisted environment for breaking encryptions: From generation, the storing and the use of rainbow tables to brute forcing in the cloud. In the second part of the talk the "Cloud Cracking Suite" is introduced: An open source suite designed to demonstrate the performance of breaking several algorithms in the cloud. The 'Cloud Cracking Suite' is splitted in two parts: The server side and the client. The server side consists of especially for the Fermi-architecture optimized, high performance implementations of SHA1 and MD5 with an interface to use them for rainbow table generation or brute forcing as well as a self-configuring Pyrit for WPA database generation. The client side provides an easy to use CLI which allows one to spawn and control a cluster for a specific task. As the server side will be available as a hosted AMI, everyone participating can simply download the client, create an account at the AWS and try it out himself.
-
-
8:01
»
Hack a Day
If you ever need to manipulate images really fast, or just want to make some pretty fractals, [Reuben] has just what you need. He developed a neat command line tool to send code to a graphics card and generate images using pixel shaders. Opposed to making these images with a CPU, a GPU processes every pixel [...]
-
-
20:28
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. 32-bit version.
-
19:50
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. 64-bit version.
-
-
15:45
»
Packet Storm Security Recent Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
15:45
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
15:43
»
Packet Storm Security Recent Files
oclHashcat-lite Advanced GPU hash cracking utility that includes the World's fastest MD4, MD5, SHA1, and SHA256 cracker. It supports up to 16 GPUs and include binaries for both Linux and Windows.
-
15:43
»
Packet Storm Security Misc. Files
oclHashcat-lite Advanced GPU hash cracking utility that includes the World's fastest MD4, MD5, SHA1, and SHA256 cracker. It supports up to 16 GPUs and include binaries for both Linux and Windows.
-
15:43
»
Packet Storm Security Recent Files
oclHashcat GPU hash cracking utility that has multi-GPU and multi-hash support. It supports dictionary-based and mask-attacks for hybrid cracking. Linux and Windows binaries are included.
-
15:43
»
Packet Storm Security Misc. Files
oclHashcat GPU hash cracking utility that has multi-GPU and multi-hash support. It supports dictionary-based and mask-attacks for hybrid cracking. Linux and Windows binaries are included.
-
-
10:01
»
Hack a Day
The power that a Graphics Processing Unit presents can be harnessed to do some dirty work when trying to crack passwords. [Vijay] took a look at some of the options out there for cracking passwords and found that utilizing the GPU produces the correct password in a fraction of the time. On a Windows machine [...]
-
-
8:12
»
Packet Storm Security Recent Files
oclHashcat-lite Advanced GPU hash cracking utility that includes the World's fastest MD4, MD5, SHA1, and SHA256 cracker. It supports up to 16 GPUs and include binaries for both Linux and Windows.
-
8:12
»
Packet Storm Security Misc. Files
oclHashcat-lite Advanced GPU hash cracking utility that includes the World's fastest MD4, MD5, SHA1, and SHA256 cracker. It supports up to 16 GPUs and include binaries for both Linux and Windows.
-
-
16:04
»
Packet Storm Security Recent Files
oclHashcat GPU hash cracking utility that has multi-GPU and multi-hash support. It supports dictionary-based and mask-attacks for hybrid cracking. Linux and Windows binaries are included.
-
16:04
»
Packet Storm Security Misc. Files
oclHashcat GPU hash cracking utility that has multi-GPU and multi-hash support. It supports dictionary-based and mask-attacks for hybrid cracking. Linux and Windows binaries are included.
-
15:09
»
Packet Storm Security Recent Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
15:09
»
Packet Storm Security Misc. Files
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
-
8:58
»
Hack a Day
Solder connections on processors seem to be a very common failure point in modern electronics. Consider the Red Ring of Death (RRoD) on Xbox 360 or the Yellow Light of Death (YLoD) on PlayStation 3. This time around the problem is a malfunctioning Nvidia GPU on an HP Pavilion TX2000 laptop. The video is sometimes [...]
-
-
13:07
»
Hack a Day
Recently, research students at Georgia Tech released a report outlining the dangers that GPUs pose to the current state of password security. There are a number of ways to crack a password, all with their different pros and cons, but when it comes down to it, the limiting factor in all of these methods is [...]
-
-
11:00
»
Hack a Day
[Rbz] fixed his friend’s Red Ring of Death stricken Xbox 360 by improving the GPU cooling. Because an overheating GPU is a common cause of the failure, he first tried to replace the thermal compound for better heat conductivity between the chip and the heat sink. This helped a bit but within two hours the [...]