No video

RTX4090 is a Password Cracking BEAST

  Рет қаралды 259,256

Seytonic

Seytonic

Күн бұрын

$5 Free Credit 👉 PCBWay pcbway.com/g/g...
0:00 Intro
0:15 RTX4090 Is a Password Cracking Beast
3:48 Hackers Steal Nuclear Secrets
7:33 Pro-Russian DDoSers are being paid?!
9:55 PCBWay
Sources:
/ 1580712040179826688
gist.github.co...
www.tomshardwa...
www.extremetec...
sports.yahoo.c...
go.theregister...
securityaffair...
www.bleepingco...
therecord.medi...
securityaffair...
www.hackread.c...
www.radware.co...
www.radware.co...
press.avast.co...
===============================================
My Website: www.seytonic.com/
Follow me on TWTR: / seytonic
Follow me on INSTA: / jhonti
===============================================

Пікірлер: 331
@___DRIP___
@___DRIP___ Жыл бұрын
Me and my friends started a drinking game where we each choose three random videos from this channel and take a shot every time you hear the words “miscreant” or “hacker”. Three out of the five of us are now in a coma and I’ve just walked out of the emergency room. Next week we’ll just use “miscreant” on its own. Encore! 🍻
@duke3068
@duke3068 Жыл бұрын
class
@RoboCrax
@RoboCrax Жыл бұрын
Wow
@KAOST1ST1C-FN
@KAOST1ST1C-FN Жыл бұрын
You're either lying, dead, or a legend. I have no way of knowing.
@narayanbandodker5482
@narayanbandodker5482 Жыл бұрын
Also "Bad Actor"
@youngbirdmen420
@youngbirdmen420 Жыл бұрын
Yooo yall gotta chill
@otrab1080
@otrab1080 Жыл бұрын
The 4090 is a trojan horse. Hackers buy 4090's to crack passwords only to have their house burned down by the 12VHPWR connectors.
@Uneke
@Uneke Жыл бұрын
Just buy jumper cables and solder on the power connectors… 😂
@-zerocool-
@-zerocool- Жыл бұрын
Only if you have a 150v version. 300v adapter seems fine.
@HedgClan
@HedgClan Жыл бұрын
Not only that, but nvidia gets the profits from the hackers as well Truly a genius decision by Nvidia
@user-pr6ed3ri2k
@user-pr6ed3ri2k Жыл бұрын
221th
@TheSuperJepphyKiller
@TheSuperJepphyKiller Жыл бұрын
LMAO facts
@midimusicforever
@midimusicforever Жыл бұрын
Security isn't about being unhackable, it's about being not worth hacking. Don't be a low hanging fruit!
@SECYBERSAFE
@SECYBERSAFE Жыл бұрын
I should pin this
@StephenGillie
@StephenGillie Жыл бұрын
Locks and passwords are there to keep honest people honest. And nobody wants stacks of Netherrack filling up their inventory.
@ishid_anfarded_king
@ishid_anfarded_king Жыл бұрын
Uhh no that's not how it works at all. IK your trying to sound deep but that just sounds dumb
@midimusicforever
@midimusicforever Жыл бұрын
@@ishid_anfarded_king How am I wrong? ;)
@neuxell
@neuxell Жыл бұрын
isnt "not worth hacking" = low hanging fruit? it's easy, but the lower quality fruit, right? ... so you want to be higher hanging fruit in that case, which means more worth
@Electrophyte
@Electrophyte Жыл бұрын
I wonder if hackers would ever use something like the flux network to use a large network of GPUs to crack passwords instead of building their own password cracking machine.
@kuo_435
@kuo_435 Жыл бұрын
they still need computing power, and the speed they need to crack passwords. And 4090 is very fast compared to a weaker one
@osnium
@osnium Жыл бұрын
my old password literally was pizza123 you password leaking monster
@Nobody-hk8wj
@Nobody-hk8wj Жыл бұрын
Now that's not good 😂
@vaisakhkm783
@vaisakhkm783 Жыл бұрын
What's you mail id? i want to sent some funny meme :D for no there purposes..
@osnium
@osnium Жыл бұрын
@@eveldun 5 year old password and nobody got the mail but thx
@dummy845
@dummy845 Жыл бұрын
@@Jtacyt gta 6? i wanna give you some candy
@NeostormXLMAX
@NeostormXLMAX Жыл бұрын
Wtf same
@electrified0
@electrified0 Жыл бұрын
My biggest reason for believing Dark Reward is state sponsored, along with the obvious motive and opportunity, is that they don't seem at all concerned with funding. Even altruists need to keep the lights on, and running such a clean hacking operation against and, supposedly, from within a hostile regime is not cheap. I suppose anything is possible, they could be a self sustained operation or be backed by some private benefactor, but the likeliest explanation would be the country with a higher defense budget than the next few runner ups combined.
@smile768
@smile768 Жыл бұрын
Black Reward are doing good things. Not normally a fan of hackers, but in this case they are entirely justified.
@arian6565
@arian6565 Жыл бұрын
W
@Jack-he8jv
@Jack-he8jv Жыл бұрын
nah, fuk those terrorists(US and isreal obviously being behind them) hope iran stand strong and dont let this mass hysteria of non-virgin whores being the norm continue, marriage between non-virgins is 99% a doomed prospect and you cant have a society without marriage that can survive for long.
@Counterhackingsafe
@Counterhackingsafe Жыл бұрын
This video serves as a strong reminder that even with the most advanced security measures in place, there is always a possibility of being hacked. It's important to stay vigilant and take necessary precautions to protect sensitive information from falling into the wrong hands.
@GainingDespair
@GainingDespair Жыл бұрын
I remember playing with Hashcat back in ... 2017 with my 980ti, I would just hash stuff, or have others hash something for me, and I would try to figure out the best combination of things to figure it out as fast as possible. The thing is though, take the 8 character pass, add 3 more characters and it will take like a month, playing with this kinda stuff was fun, and while it really helped enforce the idea of password phrase I really just started to stack my pass's.
@PotatoManners
@PotatoManners Жыл бұрын
Uu
@PotatoManners
@PotatoManners Жыл бұрын
U
@Nitrxgen
@Nitrxgen Жыл бұрын
There are right and wrong ways to get the most out of hashcat. There are dictionary attacks with rules and there are good/bad sets of both dictionaries and rules. When you've been doing it for 10+ years it comes an incredibly effective tool and your 11 character password can be cracked pretty efficiently, obviously subject to what it actually is, but most get found in a few hours. Using more secure and slower algorithms and using salts is the better practice now to eliminate straight-forward hash cracking.
@GainingDespair
@GainingDespair Жыл бұрын
@@Nitrxgen No, I get it. I know passwords typically have a formula too them. First letter is typically a cap, followed by lower case characters, numbers, than special symbol. There where some models made back on the day by feeding password dumps into a learning model. It created some rule sets once to improve hashing rates from noticed trends with passwords. You can't be to sure with salts, most tend to get leaked with the password dumps. Which is stupid, salt should never be stored with hashed passwords. Also salt tends to not be randomly generated, several databases in the past which where leaked showed the same salt used for every pass vs some dynamic salt generated based on accounts creation time of day, day, and year combined.
@ronburgundy1033
@ronburgundy1033 8 ай бұрын
⁠@@Nitrxgenwould 4x rtx 3070 be effective at cracking password ?
@PopeMical
@PopeMical Жыл бұрын
It really does amaze me people reuse passwords for accounts they really don't want hacked. It's understandable to reuse passwords for throwaway accounts or websites but when it's something you've poured money into...
@kingjames4886
@kingjames4886 Жыл бұрын
"these guys must be legit... there are no memes." lol.
@logmeindog
@logmeindog Жыл бұрын
I'd be keen to purchase a RTX4090 if EVGA was going to offer them. Probably not going to be purchasing anything for the next 4-5 years now.
@therealb888
@therealb888 Жыл бұрын
Awesome to see you back with hardware sponsors again.
@AvoidMyHitz
@AvoidMyHitz Жыл бұрын
This just makes me realise how much i need to change my gmail password but im just not gonna do it.
@siddiki9778
@siddiki9778 Жыл бұрын
y?
@willy4170
@willy4170 Жыл бұрын
Same, we are all too lazy
@siddiki9778
@siddiki9778 Жыл бұрын
@@willy4170 You're gonna regret this later. Better change your passwords now instead of being breached later for weak passwords or reusing them. A password manager makes this process really easy (still need to invest some amount of your time going through all your credentials but it definitely pays off in the long run!)
@generic6099
@generic6099 Жыл бұрын
@@siddiki9778 this. dont fall for the meme password managers though. use bitwarden or keepass
@siddiki9778
@siddiki9778 Жыл бұрын
@@generic6099 Yeah, Bitwarden & KeePass are solid choices!
@tactileslut
@tactileslut Жыл бұрын
To get paid just run this executable from a known bad source. Love it.
@willy4170
@willy4170 Жыл бұрын
The russian could have just called it: thisisnotavirus.exe
@vaisakhkm783
@vaisakhkm783 Жыл бұрын
@@willy4170 XD thismaynotbeviruswhoknows.exe
@ImInSpainWithoutTheS
@ImInSpainWithoutTheS Жыл бұрын
@@willy4170 i mean, don't russian viruses detect if the target computer has the russian keyboard pack installed on it they would still install: yeahthisisntavirus.exe though
@SECYBERSAFE
@SECYBERSAFE Жыл бұрын
This is a game changer @seytonic does salting the passwords before hashing still prevent cracking?
@JP10099
@JP10099 Жыл бұрын
salting does not slow down a brute force attack, but it prevents the attacker from using a hashtable with precracked hashes for the most common passwords and also if multiple users have the same password their salted hashes are still diffrent. So while salting doesn't out right stop an attack, it slows it down so much that it's mostly not woth it anymore
@Seytonic
@Seytonic Жыл бұрын
I made a video on hashing/salts a while back kzfaq.info/get/bejne/Y5Okob1-2tWvY3k.html&ab_channel=Seytonic
@SECYBERSAFE
@SECYBERSAFE Жыл бұрын
@@Seytonic Thanks..
@overlisted
@overlisted Жыл бұрын
salting only makes it harder to do anything with a database leak
@skoomaaddict1010
@skoomaaddict1010 Жыл бұрын
Dammit now I'm hungry.
@kairudolph6244
@kairudolph6244 Жыл бұрын
Honestly, Action movies about this decade will be fire.
@chillyfxb2360
@chillyfxb2360 Жыл бұрын
its crazy how an gpu can be used to do this now
@XYZW
@XYZW Жыл бұрын
They have been used for this stuff for a long time :D
@trueriver1950
@trueriver1950 Жыл бұрын
Yeah: a GPU is just a computer with a LOT of cores: that makes them good for doing the same calculation many times over, whether it's light ray tracing (which they are actually designed for) or running any other simple code over and over. I found a large prime number using a GPU some years ago, it was big enough to be listed for a while as being in the top 5000, though it's dropped out now. I kept my bedroom toasty warm all one winter looking for primes.
@WabyCheck
@WabyCheck Жыл бұрын
1,300$ isn't much for you maybe, but for regular citizen from russia it's like 4 month work payment
@fish3977
@fish3977 Жыл бұрын
> overtly clean and efficient hacktivist group active in a country that US has a history of attacking Yeah, that glows
@Deeveeaar
@Deeveeaar Жыл бұрын
Yeah i think so too. 😆
@therealb888
@therealb888 Жыл бұрын
@@Deeveeaar Oh you here too?! 😂 those antiscammmer videos look spicy. Been a while since I followed antiscamming.
@Deeveeaar
@Deeveeaar Жыл бұрын
@@therealb888 yes i love this channel as a hacker 😀
@nashooo5903
@nashooo5903 Жыл бұрын
It was very dumb of Seytonic to expect a "btw we are part of a CIA operation" tweet from them to confirm it
@arian6565
@arian6565 Жыл бұрын
true
@NeuralSensei
@NeuralSensei Жыл бұрын
At least add 6 characters to every high security password like work or financial just to make sure its hard to crack compared to whatever low sec passwords you use for throwaway logins.
@DarkIzo
@DarkIzo Жыл бұрын
pizzapizza123123
@youdungoofed1
@youdungoofed1 Жыл бұрын
@@DarkIzo that password is hot n ready
@nexusyang4832
@nexusyang4832 Жыл бұрын
1:52 - instead of calculating the hashes one time, has anyone thought about storing the hashes in a database so that in the future people can just look up the hash values?
@gast2118
@gast2118 Жыл бұрын
This will still take ages, imagine iterating through 1mil+ hashes
@TrueHolarctic
@TrueHolarctic Жыл бұрын
Thats called rainbow tables, and a way to defeat them is to salt the hashes
@trueriver1950
@trueriver1950 Жыл бұрын
@@TrueHolarctic that's right. @Seytonic did a video about salting some time ago, it's worth searching for it if you want to know more
@koba2160
@koba2160 Жыл бұрын
yes has been done
@sa1t938
@sa1t938 Жыл бұрын
@@gast2118 comparing strings is orders of magnitude faster than hashing passwords. The reason that this doesn't work is because any site worth a damn will salt their passwords. A salt is a piece of data added to the end off a password. For example, if the salt was "ABCD1234" and the password was "mypassword", the hashing algorithm on the website would compute the hash of "mypasswordABCD1234". This would make it so the hackers have to generate a rainbow table for each user account, which defeats the entire purpose of rainbow tables
@blakryptonite1
@blakryptonite1 Жыл бұрын
This is wild. Imagine foreign governments being able to bribe even a single engineer who worked on site.
@TheRobMozza
@TheRobMozza Жыл бұрын
Can't wait for M$ to get pawned, that'll be interesting for everybody sharing their same passwords across multiply websites.
@jimmymifsud1
@jimmymifsud1 Жыл бұрын
If a State Actor is behind Black Reward; I’m assuming the real juicy stuff has no been revealed
@barzinlotfabadi
@barzinlotfabadi Жыл бұрын
It's also possible they said the group was American/Israeli because they didn't want to tip off the hackers that they're conducting an investigation inside the country to try to apprehend them if they're operating inside Iran - standard Iranian intelligence M.O.
@Jack-he8jv
@Jack-he8jv Жыл бұрын
too complicated, the most obvious explanation is usually the correct one, aka state sponsored by the guys who are at war 92% of their existence.
@PBlague
@PBlague Жыл бұрын
Hey! I had seen your videos on my feed in general for a good while, but the thing that made me watch some of your videos(or at least made me have a greater appreciation for them) was the fact that you covered the Iran's protests and the resulting hacks against the government in a rather professional and neutral manner!(And siding with the obvious...) My country has not been doing very well in the past 40 years of these people absolutely ruthlessly murdering people an taking our freedom away in the name of "Freedom under Islam's rule" which is basically the opposite of "freedom" and it's both nice to see my people taking it to the streets after all these years and it's really endearing to see other countries(and their people, e.g. you!) taking note and talking about it in support of our people Thank you, I extremely appreciate even just these few minutes in your videos. My country is in one of the darker times of its history but hopefully this time it is a change for the better... I don't wanna see my peers getting killed anymore, hopefully the bright end of the tunnel will greet us soon! Or rather it will be greeted by us... Stay safe and keep it up, sincerely, a viewer from Iran.
@theodorpapa4710
@theodorpapa4710 Жыл бұрын
Good videos keep up the good work
@ardurabangarang7397
@ardurabangarang7397 Жыл бұрын
I imagine someone is using the password pizza123 and is very worried now.
@red_lotus
@red_lotus Жыл бұрын
Love the videos!
@JustRezki.
@JustRezki. Жыл бұрын
yo i love your videos thanks for this
@lancemarchetti8673
@lancemarchetti8673 11 ай бұрын
Great upload thanks! The 4090 will easily help uncover my simple zip, rar, 7z passwords with toos like Hashcat, because my passes are usually only 3 characters in length. However the recovered password will still register as incorrect, unless a BOM-key is provided to unlock the Byte Order Manipulation withing the archive binary. After applying the byte order key (L4C361nf) for this specific file, the original zipped file is extracted to its true representation. This is a work in progress but so far looks promising. I'm not aware of any current RE or hack tools that can unpack a random BOM method, seeing that it's not based on any algorithm as such, making it difficult to determine a set obfuscation pattern.
@iLife64
@iLife64 Жыл бұрын
CUDA is amazing at cracking hashes and encrypted files and doing other parallel computing operations
@kairudolph6244
@kairudolph6244 Жыл бұрын
7:00 filtered emails... rid of "spam" that seems more suspicious than the professional style to me.
@lagbg2249
@lagbg2249 Жыл бұрын
waiting for the rtx 4090 ti
@liarus
@liarus Жыл бұрын
The password cracking with a 4090 is useless, if someone wants to pay that much for password cracking they would instead buy an FPGA which would do the same much much faster
@Ferraday
@Ferraday Жыл бұрын
Or just rent computing power 😁
@Tech_Teen13
@Tech_Teen13 6 күн бұрын
Password cracking rig😂
@feketerobert5280
@feketerobert5280 Жыл бұрын
De cand a iesit placa asta pe piata eu am schimbat numarul de caractere de la 25 la 30 si ... la passwordul fiecarui cont de care ma folosesc 😂 E de 8 ori mai rapida decat un 1060 direct pasword crakin' rig ...mai ales dupa ce am vazut in timp real cum a "ghicit " o parola de 10 caractere foarte interesant video grij de voi si stay safe🥰
@Destide
@Destide Жыл бұрын
Will make it easier to find the hackers just look for the smoke
@kodialex
@kodialex Жыл бұрын
No one cares if you are first or last all that matters is ur password doesn't contain special characters
@ScrakSFMs
@ScrakSFMs Жыл бұрын
Thankful that I use a password manager that allows me to set the default settings for my passwords. :D
@Mr.Anders0n_
@Mr.Anders0n_ Жыл бұрын
Which also COULD be hacked, and if it did, all of your eggs are in one basket 🙄
@ScrakSFMs
@ScrakSFMs Жыл бұрын
@@Mr.Anders0n_ ok but what who the hell keeps note pads of their password. Do you?. I bet you do! But I use a self hosted password vault (kind of a manager) with a long secure password that should be enough to block any script-kitty. No backdoor or network connection. Basically you'll need to steal the device in order to get it or some how hack into an offline device. Which if the hacker really cares. Then you are just hiding something they need. so I wouldn't be worried like you. And even then they'll need to crack the password. And if it's higher than 20* than it'll give you enough time to change the passwords yourself. I don't think you understand anything about security. Like 2FA. You get my password, you're out of luck. Haha!
@ScrakSFMs
@ScrakSFMs Жыл бұрын
aka it's encrypted and if you asked beyond this you're lost in the meta-verse.
@Mr.Anders0n_
@Mr.Anders0n_ Жыл бұрын
@@ScrakSFMs and "encrypted" doesn't mean hack proof. This whole video is about breaking encryption... Duh!
@ScrakSFMs
@ScrakSFMs Жыл бұрын
@@Mr.Anders0n_ "you're lost in the meta-verse." bruh
@Anvilshock
@Anvilshock Жыл бұрын
Black Reward is a pretty cool guy. Eh cleans mail dumps of spam and doesnt afraid of anything.
@Jack-he8jv
@Jack-he8jv Жыл бұрын
if only they were attacking the bad guys(US and their masters) and not the good guys who are fighting against world wide degeneracy.
@Anvilshock
@Anvilshock Жыл бұрын
@@Jack-he8jv Your mom is world-wide degeneracy.
@rhueoflandorin
@rhueoflandorin Жыл бұрын
I use 16+ length ful keyspace [(68x2)^16 combinations] passwords that contain no words, they're randomly generated.
@cheafmin1399
@cheafmin1399 Жыл бұрын
I only reuse passwords on forums or sites I don't actually care about. If it's actually important then I use a 12 character password with no recognizable words in L33t case.
@MotiejusCompactManiac
@MotiejusCompactManiac Жыл бұрын
Not only Nvidia or MSI GeForce RTX4090 is good for hacking But is for gaming performance Which means RTX4090 would be powerful for games and hacks.
@TheDrTrouble
@TheDrTrouble Жыл бұрын
RTX 4090 is just expensive. Using the same amount you could just buy multiple graphics cards and use them to do the same. 70% better performance but also 70% increased of the price.
@JinKee
@JinKee Жыл бұрын
You guys are getting paid?
@nighty2445
@nighty2445 Жыл бұрын
woha what kind of magic are you using to show people their passwords? or does it only show my password
@beesechurger4688
@beesechurger4688 Жыл бұрын
2:56 pizza123 is the same password that my school uses for this German homework website
@RichardEricCollins
@RichardEricCollins Жыл бұрын
I would have thought the hackers would have to have the source code to the password system to be able to try to find the password from the hash. So surly if a coder used the normal proper way of doing passwords but added an something to the mix (say jumbling the stored hash up) for creating the hash the hacker can't force it.
@loran6692
@loran6692 Жыл бұрын
usually the passwords are encrypted using well-known algorithms or have been previously reverse-engineered like the windows NTLM hashes adding something to the hash so it's harder to crack the original password is called hash salting and it provides protection against rainbow tables, seytonic has a video about it if you're interested
@ZonkedCompanion
@ZonkedCompanion Жыл бұрын
I thought this too, although you will be surprised the amount of cms systems which just use straight md5. Just add salt to your hashes, so long as the salting system isn't compromised in theory it would be near impossible to reverse md5. Tastes better too.
@moth.monster
@moth.monster Жыл бұрын
The trick is to just use a long random password with a password manager secured by a passphrase.
@mikecurry6847
@mikecurry6847 Жыл бұрын
Is it still that easy to crack the hashed passwords if the hashes are salted, particularly salted multiple times over? Like how much longer would that 42 minutes time estimate lengthen if the software had to go through 8 layers or more of salt? I feel like that should honestly be common practice by now even though it's probably not
@spoonikle
@spoonikle Жыл бұрын
Look, if your going to DDOS for money - You use public connections or a botnet cluster. dont hack people from home kids. Just don’t. You could, for example, grab a bunch of old weak SBC’s and thin clients, connect them to public wifi via directional antennas and start blasting. The hardware does not need to be fast, because the connections are slow. If you aggregate the links you could get some serious work done. Only issue is you need to make this set up mobile and move shop a bunch. This is why most think overt and obvious targeted attacks are state funded. If your efforts are not paying the bills - its not worth it as a hacker. Political attacks make no money, skilled people have bills to pay and skills pay the bills - you don’t waste them on hacking a nation for political reasons - nobody is “Mr. Robot” you need teams of smart people. For example, who would risk compromising their painstakingly built botnet to ask Iran to stop… researching nuclear power/weapons? I don’t think you need to be reminded, but the current global leader - the USA - is the only nation to use nuclear weapons in anger, and the Japanese where already willing to negotiate surrender - but the USA demanded unconditional surrender, and murdered a quarter of a million people to do it. Researchers are probing and blocking botnets every day. If you use your botnet for a large attack, it will be “burned” pretty quick - as the exact devices you deployed get blacklisted from the major networks. This is why crude ddos tools that you beg children to install are so popular, you need a constant supply of suckers. Honestly… I think our government is using the false notion of “Movie Hackers” to dupe the public into thinking that these attacks on the enemies of the USA are “just hacktivist groups” but every single possible hacking attempt from Russia is state sponsored. Spoiler alert - its all state sponsored.
@mackinner
@mackinner Жыл бұрын
What a based hacker with the NTMA message lmao
@artyomloukashov636
@artyomloukashov636 Жыл бұрын
With some curious googling NTLM appears to be discarded precisely for the reason of being "brute-force ready" a decade ago. Using it as a benchmark for today's state of the art engineering is baad. Current encryptions are safe indefinitely.
@ozz961
@ozz961 Жыл бұрын
thats the only thing i think about everytime a new gpu gets released
@kernelklustrrfukk152
@kernelklustrrfukk152 Жыл бұрын
Thanks!
@Seytonic
@Seytonic Жыл бұрын
Hey, thanks my dude :) Much appreciated!
@Iplayforfood88
@Iplayforfood88 Жыл бұрын
Russians helping Iran get Nukes, essentially you need a nuclear power plant to produce nukes. This is rather global news worthy.
@SackyBalls444
@SackyBalls444 Жыл бұрын
Well, I'm glad there's *some* legitimate use buying one.
@hackandtech24
@hackandtech24 Жыл бұрын
As an iranian american i had to download the nuclear leak from iram
@Life-Sky
@Life-Sky Жыл бұрын
6:33 No memes or childish insults? 100% state sponsored then lol
@mx338
@mx338 Жыл бұрын
It is very stupid of Iran's nuclear organisation to not use PGP/GPG, which is really quite easy to implement for all users.
@firstnamelastname-oy7es
@firstnamelastname-oy7es Жыл бұрын
A 970 takes 15 years to crack an 8 letter password of numbers, upper and lower case and symbols. (with sha 256 hashing)
@kingdanett4043
@kingdanett4043 Жыл бұрын
Hey did this video get taken down and reuploaded? I wanted to show this to an IT friend and it said unavailable, but then when I went to the channel the link worked just fine
@kenosabi
@kenosabi Жыл бұрын
And it'll warm the entire room for you!
@HassanSanem
@HassanSanem Жыл бұрын
Once I read in their slogan " For Women, life, freedom," I'm like yaaaaa right
@contentsritual8334
@contentsritual8334 Жыл бұрын
i name is so rare that im able to just use it as a password and nobody would bother lol
@gamereditor59ner22
@gamereditor59ner22 Жыл бұрын
Hello user👋.... D/Hello_World>: Is it possible to develop an asymmetric encryption combination of one-time pad with enigma and 256-bit AES (features to force users to get creative on password instead of same password)?
@cripz1436
@cripz1436 Жыл бұрын
Omg I would love to get my hands on a RTX 4090 for password cracking or network penetration testing
@RIPPEDDRAGON40k
@RIPPEDDRAGON40k Жыл бұрын
Lol... 8 characters in 45 or so minutes or so... at that rate its still gunna take 300 Trillion years to hack my minimum length passwords
@akash0156
@akash0156 Жыл бұрын
I even don't know rtx is used for this type of things
@PapiGordo5360
@PapiGordo5360 Жыл бұрын
Any GPU can be used for this
@ayo4008
@ayo4008 Жыл бұрын
What about salts how exactly dictionary attack can beat salt?
@Uneke
@Uneke Жыл бұрын
If you have the money to build a rig out of 4090s you have the money to store crunch lists and destroy 12-14 character passwords in minutes… lol 20-30 terabytes of crunched dictionary passes and 2-4 4090s. That would be a scary machine lol
@RIPPEDDRAGON40k
@RIPPEDDRAGON40k Жыл бұрын
Do some math, at 12 characters with a hash space containing uppers, lowers, numbers, and special characters... You are looking at something like 200,000 days according to my napkin with 4 gpus. This was based on 8 characters being 3/4 an hour for one 4090 and each new character adding 75 or so new options.
@Uneke
@Uneke Жыл бұрын
@@RIPPEDDRAGON40k this was based on 8 characters with brute force… Do you know much about cracking? Using a dictionary attack exponentially and drastically cuts that time down… there are no calculations with dictionary, just comparison… with 4 of them it’s doable. The fastest rig had 25 virtual AMD gpus with 20gbps communication (348billion hashes per second). It could break every ntlm windows password up to 14 characters in 5.5 hours with brute force. Not just every combination of 14 characters but every combination of password from 1 character to 14. This would be equivalent to 32 1080TI units (which is MUCH faster and there would be 7 more as an equivalent) and would be cutting its time by 5-6x with a dictionary. My math is right.
@RIPPEDDRAGON40k
@RIPPEDDRAGON40k Жыл бұрын
@@Uneke Do you know much about computer science and hashing? Give me the length and character set allowed and we can calculate the number of total options needed to hash, multiple that by the time it takes to calculate one and you have how long it will take. Of course if you have a prebuilt dictionary of hashes for a specific algo and are just searching it you can save some time.
@Uneke
@Uneke Жыл бұрын
@@RIPPEDDRAGON40k every time I reply with a link to show you the breakdown… it gets removed… quite annoying. You’re more than welcome to look up previously built rigs to see that the ntlm algorithm has been smashed within a couple hours from far weaker machines than the one I proposed. I’ve given up on trying to provide links as YT is stupid and just removes them :(
@RIPPEDDRAGON40k
@RIPPEDDRAGON40k Жыл бұрын
@@Uneke Still reliant on a dictionary and then have to brute force it past a certain character limit. Also fyi there are a total of 97 character options in windows passwords (52 normal characters + 10 numbers + 35 special characters). 97^6 is ~8.32 Billion so it will take 8.32 Billion times as long to brute force calculate a 14 character vs a 8. Dictionary attacks are only as good as the prebuilt dictionary you are using. If you wanted true hashing throughput you wouldn't use a GPU these days and either write your own fpga software or fab out a dedicated asic for your algo you want to hash. I would guess your skills end at writing simple scripts for your prebuilt linux distro filled with hacking tools that you downloaded from a sketchy site on the dark web.
@aaaaaa-hh8cq
@aaaaaa-hh8cq Жыл бұрын
7:16 and by experienced you mean "state sponsored"
@xr.spedtech
@xr.spedtech Жыл бұрын
0:26 Where is the the hash located for windows passwords ?
@AverageExploitDeveloper
@AverageExploitDeveloper Жыл бұрын
2FA sending codes to your phone number *Sighs of relive*
@BeatSaberNoob
@BeatSaberNoob Жыл бұрын
ahhh so itll only cost me 2k to get my old email accounts back 🤣
@Kurier_Inpost
@Kurier_Inpost Жыл бұрын
And i still have GTX 960 lmao
@mylastaltsrrsly5967
@mylastaltsrrsly5967 Жыл бұрын
You should upgrade if you can
@Vysair
@Vysair Жыл бұрын
How is it compared to a server GPU?
@robertvalenica8999
@robertvalenica8999 Жыл бұрын
Nvidia can just lock there future GPUs from doing this :/ since there GPUs are closed source, just recently they added driver updates to stop you from recording any streaming platform
@jcdenton7914
@jcdenton7914 Жыл бұрын
When was this driver? I will have to get the last driver before that one
@Jack-he8jv
@Jack-he8jv Жыл бұрын
wtf, thats ridiculous and how do they know if im recording a stream and not a video.(fuking hell if my phone wasnt rigged enough as is)
@snarevox
@snarevox Жыл бұрын
back in the 70s and 80s, my porn name was "black reward"..
@null3667
@null3667 Жыл бұрын
Did the black reward twt get taken down?
@Goldenhordemilo
@Goldenhordemilo Жыл бұрын
I think they would brake into peoples homes and steal them. I dont think thieves will pay for them
@Imran_FBD
@Imran_FBD Жыл бұрын
I reuse 6 passwords. Literally. The only thing keeping me safe is 2FA.
@Gambit24
@Gambit24 Жыл бұрын
where can i see that data dump
@vojta7552
@vojta7552 Жыл бұрын
Subbed
@dennisrkb
@dennisrkb Жыл бұрын
With modern GPU's hashing rates I/O becomes the bottleneck hence diminishing the value of dictionary attacks.
@punishedgwynie
@punishedgwynie Жыл бұрын
black reward is CIA lmao
@opshredderytp
@opshredderytp Жыл бұрын
I NEED IT THEN
@geroffmilan3328
@geroffmilan3328 Жыл бұрын
80k rubles, wow. And how exactly will you spend them - cos I feel sure it will be paid in rubles specifically... and anyone spending those outside Russia almost certainly gets tagged for "further review" by certain 4-letter agencies (no that's not a typo, think CERT).
@generic6099
@generic6099 Жыл бұрын
its in crypto.
@iamzirotoxic5841
@iamzirotoxic5841 Жыл бұрын
Thanks support iran :) we won't forget you ♥
@ab.5
@ab.5 Жыл бұрын
bro hide the links then show their telegram link
@kr0gan105
@kr0gan105 Жыл бұрын
Black Reward got suspended on Twitter ... of course
@jirehla-ab1671
@jirehla-ab1671 Жыл бұрын
How abt a combination of multiple unicode 8 character password
@fusebox4473
@fusebox4473 Жыл бұрын
Black Reward is a MOSSAD opperation
@EthanSeville
@EthanSeville Жыл бұрын
16 char “random” passwords x3
@realrickastley
@realrickastley Жыл бұрын
very cool!
@knucklestheechidna5718
@knucklestheechidna5718 Жыл бұрын
I guarantee you none of my passwords are in any dictionary they are not even words they were literally combinations of symbols uppercase and lowercase letters literally in random succession and 16 digits long. I write them on a piece of paper with my hand and a pen and I store them inside of my safe.
@andreasherzog5268
@andreasherzog5268 Жыл бұрын
damn, I want a Pizza now 🤤
@Abun822
@Abun822 Жыл бұрын
hashcat uses only 25% of the GPU power
Undercover CIA Websites Got Informants Killed
9:53
Seytonic
Рет қаралды 560 М.
Password Cracking - Computerphile
20:20
Computerphile
Рет қаралды 3,4 МЛН
CHOCKY MILK.. 🤣 #shorts
00:20
Savage Vlogs
Рет қаралды 27 МЛН
No empty
00:35
Mamasoboliha
Рет қаралды 12 МЛН
SCHOOLBOY. Последняя часть🤓
00:15
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 10 МЛН
Takeover Hack Could Affect Millions of Trucks
11:00
Seytonic
Рет қаралды 73 М.
How the CIA Stole a Russian Submarine
15:47
fern
Рет қаралды 741 М.
Some Guy Just Hacked North Korea
6:59
Seytonic
Рет қаралды 1 МЛН
The Hacking Empire Built on Discord
9:57
Seytonic
Рет қаралды 214 М.
When a CIA Hacker Goes Rogue
23:09
TyFrom99
Рет қаралды 1,8 МЛН
How Hackers Bypass Kernel Anti Cheat
19:38
Ryscu
Рет қаралды 650 М.
Is your PC hacked? RAM Forensics with Volatility
14:29
The PC Security Channel
Рет қаралды 905 М.
Hacked From a Google Search
11:26
Seytonic
Рет қаралды 153 М.
CHOCKY MILK.. 🤣 #shorts
00:20
Savage Vlogs
Рет қаралды 27 МЛН