Hackers Use Nvidia GPUs to Crack WiFi

Page 2 - Seeking answers? Join the Tom's Hardware community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
G

Guest

Guest
nVidia CEO Jen-Hsun Huang had foresight when he said "We're gonna open a can of whoop-ass...".
 

seboj

Distinguished
Mar 31, 2008
403
0
18,790
[citation][nom]manwell999[/nom]brute forcing 128 bit encryption means searching a key space of 340282366920938463463374607431768211456 possibilities.If a gtx280 could do 1.2 tera keys per second, which is it's theoretical ops per second. Then it will take an average of 8985747937130265067 years to crack a 128 bit key by brute force.This article should be taken with a grain of salt.[/citation]

+1 for common sense.

If you people believe that WPA/WPA2 have actually been "broken" and are now useless, you need to go back to high school and retake your math classes.
 

adamk890

Distinguished
Jul 28, 2008
31
0
18,530
[citation][nom]hannibal[/nom]Well ATI 4870 and NVidia http://en.wikipedia.org/wiki/Nvidia 280 has so much prute force, that this is somewhat possible... Can anyone see that there will be regulations that CPU's and GPU of certain power may not be available to common citicen, because of their decryption power? ;-)Well, it can not happen! Can it?Orwel 1984[/citation]

hope your kidding there i dont want to go down to my local registry to get my next graphics cards but hey anything is possible.
 
you dont need to repeatdly try to actively hack a network, especially for WPA, passively capturing the handshakes is all you need. All of the cracking is done on the local file system. An admin would have no idea someone was listening in.
 

curnel_D

Distinguished
Jun 5, 2007
741
0
18,990
Yeah, seriously. I just broke a WPA 3 weeks ago with my move for the wireless I'm sending this with. It took me all of 2 hours to get enough data from host to pc. But using GPGPU programming is an amazing idea. Does ATI have any comparable programs similar to CUDA?
 

seboj

Distinguished
Mar 31, 2008
403
0
18,790
[citation][nom]curnel_d[/nom]Yeah, seriously. I just broke a WPA 3 weeks ago with my move for the wireless I'm sending this with. It took me all of 2 hours to get enough data from host to pc. But using GPGPU programming is an amazing idea. Does ATI have any comparable programs similar to CUDA?[/citation]

Yeah, it's called AMD Stream Computing, and it's been around for years.
 

Neog2

Distinguished
Sep 7, 2007
152
2
18,715
[citation][nom]wh3resmycar[/nom]question is, where they able to run crysis? lol[/citation]

Yes that is the real question lol.
 

Masay

Distinguished
Oct 13, 2008
1
0
18,510
why not to prevent bruteForce from the Begining ?

Is u tell the Wpa~ algoritim to Accept 1 password Check once per 1 Or 2 secs. for u to login for the first time will take few more seconds, but the attacker can guess 1 password per 2 secs he cant use brute.
 

hemelskonijn

Distinguished
Oct 8, 2008
412
0
18,780
brute forcing 128 bit encryption means searching a key space of 340282366920938463463374607431768211456 possibilities.If a gtx280 could do 1.2 tera keys per second, which is it's theoretical ops per second. Then it will take an average of 8985747937130265067 years to crack a 128 bit key by brute force.This article should be taken with a grain of salt.

What if you index the 340282366920938463463374607431768211456 possible options and split the index over several machines (a lot) ?
 

Fanaticvo0

Distinguished
Oct 13, 2008
1
0
18,510
This is what i found....

(According to The Register, Russian company Elcomsoft has made a major jump in cracking WPA and WPA2 passwords using Nvidia graphic cards to brute force the passwords. They say that a system with two Nvidia GTX 280 video cards in it can crack the passphrase 100 times faster than anything before.)
 

hannibal

Distinguished


Ofcource I am kidding ;-)

With this same methology we should ban all home computers, because they can be used to make crimes... As well as cars, some tools etc...

But a little conspiracy theory makes a day little better :)
 

v12v12

Distinguished
Sep 9, 2008
91
0
18,630
Unfortunately I see some logic flaws in these BS arguments about "ZOMG 130298984938439 dif possibilities" Namely the password itself would have to be absolute, and use a ton of randoms alphanumerics and be very long and annoying to input. The cracker doesn't have a clue what the pass is, but I'm betting it's not going to be that complex, nor that long based on some of the supposed "secure" employers I've worked at: That and the "luck" factor. You don't know wtf the password is, so assuming it's going to be something ridiculous by default is flawed. So they may indeed have found the correct one with the luck factor. Blah blah saying this and that is 20490249029409720742 long so it's fool proof makes you a fool. Lol, I remember years back people yapping about how the speed of light/sound/earth is flat… is absolute, and nothing could go faster blah blah, LONG proved false and plain stupidity to assume most-anything is "absolute." It's just not with in the scope of current measurement standards. Just like Encryption is NEVER going to be "absolute," in actuality it's just "more secure" vs another form of encryption. WPA can be cracked by PTW method quite easily with a days worth of packets or less of you've got ARP injection kicking in. WPA in some instances can be cracked faster than WEP if you get the needed magic-packet.

RemoteExploit forums will clown any of you claiming WPA is all this and that. For the script kiddie, sure, but for folks that KNOW wtf they are doing, WPA isn't much of an obstacle. WPA2 is another matter, but not impossible. Plenty of people cracking all kinds of shit, and preferring to keep their mouths SHUT about it, and keep exploiting Vs boasting about their efforts and having the security community INCREASE standards, thus making the cracker's life even more hassle. Silence is worth more than the 15min of fame bragging. Look at bump-keys… LONG known security flaw in near 99% of locks in American house-holds. But up until recently the stupid locksmithing community just kept it a secret, lol!
 

hemelskonijn

Distinguished
Oct 8, 2008
412
0
18,780
Looks like the post above is from some n00b that has no clue at all.
No one stated WPA WPA2 or any other type of security was absolute and we all know the new encryption methods suck slightly less, though the discussion was about the possibility to brute force WPA2 for as far as i know.

And yes using some awesome BOINC like grid computing project it should be do-able to brute force nearly anything however doing it in limited time on less machines using primarily GPU's is a discussion worthy accomplishment even though chances are great that either it was a coincidence or it will be very hard to reproduce on the current hardware its always nice to be reminded there is always a weak spot.

on a more personal note ... magic packets are for loud script kiddies and pushing people to go stealth in a post loaded with all kinds of insults written in the style most ignorant 12 year old's do seems to only feed the 1337 script kiddie image you are creating for yourself.

(Contradiction in Terminus its like being a bag of shit but a real good bag of shit)
 

v12v12

Distinguished
Sep 9, 2008
91
0
18,630
Again... if you take offense, then you apparently have a problem. As I haven't specified anyone by nick or name on this mimi-forum. Please address the issues individually if you claim to know so much about them? Name calling in a counter-punch like effort is merely sophomoric, and just as juvenile as calling someone a "noob—" just as making things on a "personal note." I don't know you, you don't now me. But please, lets hear just what you know about ARP-injection and about PTW, WPA etc.

The point of my rant was to mildy highlight the flaws in thinking about absolutes and claimed nearly impossible odds of cracking WPA/2. Just like it was WIDELY held that breaking the sound barrier on land or air was "impossible." Yadda yadda. Taking the wanna-be tone of some better than thou "adult," is a fraud. Oh and don't you mean "Contradictio in Terminus?" Cut the crap. Touche.
 

inetWalker

Distinguished
Oct 14, 2008
1
0
18,510
\\\"you dont need to repeatdly try to actively hack a network, especially for WPA, passively capturing the handshakes is all you need. All of the cracking is done on the local file system. An admin would have no idea someone was listening in.."

If the admin had a wifi card in monitor mode using something like airodump and dumping the data off to an app such as snort -> setup up proper rules.. an admin would have an idea.. you can protect yourself... most are just lazy or don't know their options...
 

v12v12

Distinguished
Sep 9, 2008
91
0
18,630
Geesh... just like WEP, I don't need to constantly monitor... I just COLLECT and crack at the same time or use diff boxes etc. That "magic" packet is merely the correct handshake, which can be received@random aka in 2309202309243 tries or 10x less. Setting up fake auths to capture... simple as pie. It's only a matter of time for basic WPA, since most people don't have routers + machines supporting WPA2. WPA is a mere increase in hassle for a "hacker," but not a fortress wall. Why waste time on WPA, when I can just inject, PTW ~60K packets for WEP, since many people still use it. Guy making issue with me doesn't know much at all, he's merely grandstanding in attempt to debate. Using some foo-foo faux latin (improperly@that!) jargon... Your flawed implications about WPA/ and WPA2 not being "easily" cracked is as fresh as MANURE, as is sorta like claiming video and audio streams with DRM cannot be cracked. Lmfao LONG cracked and removed. There's always some yap/sap out there blathering on that the newest/next best thing is—THE ULTIMATE UNSTOPPABLE... that is until someone slaps them in the face with NEW methods of decrypting and intelligent cracking/exploits.

Like I said before... HOW many of you have known about Bump-keys? Prob 99% have not, BUT many of us have known about them for decades and just never said anything. "Sorry ma'am no evidence of lock tampering was found" "WOW musta been some super sleuth, mission-impossible thief huh?" OR... maybe someone with a simple ground-down key, a hammer and knowledge YOU don't know about. Now go check your POS front door lock and see just how vulnerable it really is. Just like your supposed invulnerable WPA(2) network.

I hate to be mean and or nasty, but you sir, have been checked.
 

Pixels303

Distinguished
Oct 16, 2008
13
0
18,510
Theoretically speaking, someone could use an excuse in a court hearing for hosting or downloading copyrighted material that there is a good likelyhood that someone broke the WPA on their WiFi, so they cannot be held accountable. One step closer to a open network. WiFi in my opinion should be wide open everywhere, then you wouldn't need to buy Cellular services as the internet would be available everywhere.
 
G

Guest

Guest
This is very real, and taking this with a grain of salt is purely retarded. This article was from over 2 years ago and look at the advancements in GPU's now! I was able to use 2 GTS-250 SLI, BackTrack 4 and a handful of other applications to demonstrate the severity of this in a research project in college. It works, not only that its cheap processing power, easy to configure with a little bit of research and BAM! The annoying dearest comrade across the hall in my dorm didnt know what him! He had thought WPA was so secure, NOT. First start with WEP, conquer hacking that encryption then move to WPA, then WPA2 (TKIP or AES), thats where you will need to fully understand CUDA/PhysiX C proramming and how to harness the power of both the CPU and GPU simultaneously, hence Parrallel Programming. This is that technique/method that the Chinese government used to build the worlds fastest "super computer", Which it was somewhat, but it was the cheapest, fastest super computer on the planet. My thought is that gfx processing will be done in the cloud and the prcessed data will be streamed to the end user, much like "On-Live" is today.
 
Status
Not open for further replies.