Location:Okemos Rd,,United States
Tuesday, December 27, 2011
Wednesday, December 7, 2011
GPU Password Cracking
We used to have a little comfort that if someone got a hole of your password hashes, it would at least take them considerable time to crack and extract the passwords.
Those days are gone !
Brute force cracking password hashes is becoming too easy thanks to apps that make use of the multiple cores in graphics cards.
CPU Password cracking
Core 2 Duo 2.13 GHz - 2.5 Million Hashes / Second
Core i7 980x - 19. Million Hashes / Second
GPU Password cracking
Radeon HD 5830 ($109) - 290 Million Hashes / Second
Radeon HD 6990 (($740) - 760 Million Hashes / Second
Multi GPU setups can achieve staggering rates of performance.
The White Pixel system (http://whitepixel.zorinaq.com/) has 4 AMD Radeon HD 5970 graphics cards and custom software. (each 5970 Card has dual GPU ‘s and costs around $400).
it can churn through more than 33 Billion Password hashes per second.
What's the best Alternative to passwords ?
-Posted from my IPhone 4S
Those days are gone !
Brute force cracking password hashes is becoming too easy thanks to apps that make use of the multiple cores in graphics cards.
CPU Password cracking
Core 2 Duo 2.13 GHz - 2.5 Million Hashes / Second
Core i7 980x - 19. Million Hashes / Second
GPU Password cracking
Radeon HD 5830 ($109) - 290 Million Hashes / Second
Radeon HD 6990 (($740) - 760 Million Hashes / Second
Multi GPU setups can achieve staggering rates of performance.
The White Pixel system (http://whitepixel.zorinaq.com/) has 4 AMD Radeon HD 5970 graphics cards and custom software. (each 5970 Card has dual GPU ‘s and costs around $400).
it can churn through more than 33 Billion Password hashes per second.
What's the best Alternative to passwords ?
-Posted from my IPhone 4S
Tuesday, December 6, 2011
Honeypot Folders
Everyone knows that a honeypot server is a system on the network which contains what appears to be juicy valuable PHI or other confidential data.
I recently heard mention of setting up a system using honeypot folders on servers as a easier and cheaper alternative.
Basically, you can do the following.
1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.
2. Notify users that the folder is not to be accessed.
3. Configure logging of all access to the folder and also alerting
Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.
1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.
2. Notify users that the folder is not to be accessed.
3. Configure logging of all access to the folder and also alerting
Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.
-Posted from my IPhone 4S
I recently heard mention of setting up a system using honeypot folders on servers as a easier and cheaper alternative.
Basically, you can do the following.
1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.
2. Notify users that the folder is not to be accessed.
3. Configure logging of all access to the folder and also alerting
Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.
1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.
2. Notify users that the folder is not to be accessed.
3. Configure logging of all access to the folder and also alerting
Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.
-Posted from my IPhone 4S
Location:Okemos Rd,,United States
Friday, December 2, 2011
iPhone 4s rocks
After 3 weeks I'm still enjoying my work iPhone 4s.
Siri has issues with my new Zealand accent but short commands work ok.
Just need to migrate from my Motorola zoom to an iPad next.
-Posted from my IPhone 4S
Siri has issues with my new Zealand accent but short commands work ok.
Just need to migrate from my Motorola zoom to an iPad next.
-Posted from my IPhone 4S
Location:Work
Subscribe to:
Posts (Atom)