Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
banner Expire 26 October 2024
Rescator cvv and dump shop
banner expire at 13 May

Yale lodge shop
UniCvv
banner Expire 1 April  2021

RedX

TRUSTED VENDOR
Staff member
Joined
Nov 26, 2020
Messages
655
Hive Systems has conducted another study on brute-force password cracking. This time, experts focused on the Bcrypt algorithm.

Hive Systems, which specializes in cybersecurity, has been testing password cracking using brute-force attacks for several years. All this time, the object of research was passwords encrypted using the widely used MD5 algorithm, the hashes of which in many cases are easy to "break through".

However, organizations are increasingly turning to more secure algorithms, such as Bcrypt, which has become the most popular in recent years.

78a82e5386.jpeg



That's why Hive decided to shift the focus and try Bcrypt password hashes by heart, using a dozen NVIDIA GeForce RTX 4090 GPUs.

Research has shown that passwords that are 7 characters long and shorter can be cracked within a few hours. These results are noticeably different, because in last year's tests, weak passwords of 11 characters encrypted with MD5 were cracked instantly. The same 11-character password can be cracked in 10 hours using the Bcrypt algorithm.

The company claims that strong passwords (containing numbers, uppercase and lowercase letters, symbols) and relatively strong passwords (containing uppercase and lowercase letters) are quite difficult to crack if they are longer than eight characters. These Bcrypt-protected passwords can take months or years to crack.

In the course of the study, experts received a hash associated with a randomly generated password and tried to crack it. Hive noted that passwords generated in a non-random way are cracked much easier and faster, since people are quite predictable.

ca70cdc347.jpeg
 
Top Bottom