2671
Security / Re: How does SR protect us?
« on: June 06, 2012, 05:02 pm »
<- was making a joke
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
in 2011 total GPU power was 6.4x10^18 operations per second. ( 97% capacity )
Let's apply Moore's law and say that we multiply by 2
So, 1.28x10^19 op/s
Sha256 requires 121438 operations.
So, per second we can say that the earths entire gpu proccesing power could produce
1.0540358x10^14 hashes per second. Not including any other logic.
A single password using only [Alpha, alpha, number] with a length of 20 would have about 1.85x10^35 possible combinations.
You can see how this is impossible. My math may be a little off but even so, when dealing with exponentials it gets really big really fast.
This only applies to sha 256, not to the majority of encryption methods which are crackable.
no you can't
Yes, you can:
http://www.techrepublic.com/blog/security/welcome-to-the-future-cloud-based-wpa-cracking-is-here/4097
http://www.infosecisland.com/blogview/11018-Cracking-WPA-Protected-WiFi-in-Six-Minutes.html
There's even commercial services that will do it for you if you aren't confident using Amazon Cloud etc:
https://www.wpacracker.com/
wow you might even be able to brute force a twelve character password with that sort of computing power, if it is all lower case and not salted and PKCS5 iterations are not being used, and you have a lot of years to spend on it !
It depends what kind of password.
You can brute force a complex 13 digit WPA password (from handshake) in about 20 mins.
Where can I go to nominate you for the full of shit awards, I think you are a shoe in to win
Rather than be rude you could always test me. People's ignorance here never ceases to amaze me.
What modern encryption algorithim is quickly cracked via bruteforce?
You're thinking the wrong way...
Rather than asking "What modern encryption algorithm is quickly cracked via bruteforce?" you should be asking "how can I make the bruteforcing of this algorithm quicker?"
lol, what are you doing, clustering a botnet? Haha, that would be funny and pretty cool.
I've been wondering this for some time. Basically, in the unlikely event that SR got busted and servers got seized...how much would LE know?
Having previously worked for the security services I can tell you that given enough time LE would know everything. It's a game of cat and mouse. LE are only interested in the suppliers not the buyers, so most buyers will be safe.If LE busts in, you're fine if your password is strong
I'm not going to detail how here, although anyone with advanced IT knowledge will know, but when I used to work for LE we could crack almost any password (even 200 digits long with random characters, numbers & letters) in a matter of minuets, so that affords you no protection.
To be honest for most things you may as well not have a password, all it does is show me there's something juicy there. When cracking wireless networks I look for password protected WPA networks with a hidden SSID (name) as I know they will contain something useful.