blog posts

The Security Researcher Demonstrated The Terrifying Power Of The RTX 4090 In Cracking Passwords

The Security Researcher Demonstrated The Terrifying Power Of The RTX 4090 In Cracking Passwords

Nvidia’s RTX 4090 Graphics Can Crack User Account Passwords In Almost All Possible Algorithms With 2.5 Times Faster Speed Than The Previous Generation.

Sam Crowley is a security researcher who researches the field of password cracking. In new benchmarks, he has shown the power of the RTX 4090 graphics in breaking the passwords of user accounts.

Nvidia’s latest flagship graphics card broke records previously held by the RTX 3090 and performed twice in almost all algorithms. The passwords found by the RTX 4090 met all security aspects and included a random combination of letters, symbols, and numbers.

According to Crowley, the giant and robust RTX 4090 graphics were tested on Microsoft’s well-known NTLM authentication protocol and Bcrypt (a method for hashing passwords). Hashcat v6.2.6 did all tests.

Hashcat is a popular and widely used password-cracking tool used by system administrators, cybersecurity researchers, and even cybercriminals to test or guess user passwords.

According to TechSpot, the tests show that the system equipped with eight RTX 4090 graphics has enough power to recognize all 200 billion modes of an eight-character password in 48 minutes.

This duration is 2.5 times less than the previous RTX 3090 record.

The Hashcat tool provides several types of cyber attacks, such as dictionary attacks, and these types of attacks have a great chance of finding user account passwords due to the user’s failure to choose the correct password.

In cyberattacks, it is possible to first focus on known words, phrases, or patterns to reduce the time needed to crack a password. The time required to find the password can be reduced from 48 minutes to less than one minute using some solutions,

The benchmark results attributed to RTX 4090 are alarming and scary at first glance, But you should not forget that such an approach has limited applications in the real world. The CEO of the MIRACL software company says that such attacks are usually carried out offline; Because there are many security systems in the online space.