logo
Welcome

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Pro Carders

Admin
Staff member
Joined
Apr 5, 2024
Messages
138
Points
16
Hive Systems has conducted another study on brute-force password cracking. This time, experts focused on the Bcrypt algorithm.

Hive Systems, which specializes in cybersecurity, has been testing password cracking using brute-force attacks for several years. All this time, the object of research was passwords encrypted using the widely used MD5 algorithm, the hashes of which in many cases are easy to "break through".

However, organizations are increasingly turning to more secure algorithms, such as Bcrypt, which has become the most popular in recent years.

78a82e5386.jpeg



That's why Hive decided to shift the focus and try Bcrypt password hashes by heart, using a dozen NVIDIA GeForce RTX 4090 GPUs.

Research has shown that passwords that are 7 characters long and shorter can be cracked within a few hours. These results are noticeably different, because in last year's tests, weak passwords of 11 characters encrypted with MD5 were cracked instantly. The same 11-character password can be cracked in 10 hours using the Bcrypt algorithm.

The company claims that strong passwords (containing numbers, uppercase and lowercase letters, symbols) and relatively strong passwords (containing uppercase and lowercase letters) are quite difficult to crack if they are longer than eight characters. These Bcrypt-protected passwords can take months or years to crack.

In the course of the study, experts received a hash associated with a randomly generated password and tried to crack it. Hive noted that passwords generated in a non-random way are cracked much easier and faster, since people are quite predictable.

ca70cdc347.jpeg
 
Top