Home > tehsuki import > Revolutionary technique to quickly recover lost passwords

Revolutionary technique to quickly recover lost passwords

October 28th, 2007 Leave a comment Go to comments

Source: http://www.net-security.org/secworld.php?id=5567

 

Using the “brute force” technique of recovering passwords, it was possible, though time-consuming, to recover passwords from popular applications. For example, the logon password for Windows Vista might be an eight-character string composed of uppercase and lowercase alphabetic characters. There would about 55 trillion (52 to the eighth power) possible passwords. Windows Vista uses NTLM hashing by default, so using a modern dual-core PC you could test up to 10,000,000 passwords per second, and perform a complete analysis in about two months. With ElcomSoft’s new technology, the process would take only three to five days, depending upon the CPU and GPU.

 

Categories: tehsuki import Tags:
  1. No comments yet.
  1. No trackbacks yet.
You must be logged in to post a comment.