EVGA

GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery

Author
z3r0t0l0rence
Omnipotent Enthusiast
  • Total Posts : 9599
  • Reward points : 0
  • Joined: 2009/10/08 10:14:51
  • Location: Arizona
  • Status: offline
  • Ribbons : 20
2010/09/08 08:55:30 (permalink)

i7 930 OC 4.21 
EVGA E758 
GSkill 12GB
Evga GTX 780 SC
2x Kingston 240 Raid 0
2x Seagate 4TB
 
 
#1

11 Replies Related Threads

    Rudster816
    CLASSIFIED Member
    • Total Posts : 4353
    • Reward points : 0
    • Joined: 2007/08/03 22:07:51
    • Location: Eastern Washington
    • Status: offline
    • Ribbons : 18
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/08 15:13:14 (permalink)
    Im not sure about the others, but there is no way your going to be able to crack any modern encryption algorithm or hash function by any means in a reasonable time frame via brute force. A dictionary attack is certainly possible, but most people are using some type of multi-word\number\symbol\caps password, so unless you get lucky and the password is just a single english word without any special symbols\casing\numbers, your SOL.

    It would take all the computers in the world 100's of years in order to crack modern algorithms with shear brute force, and most algorithms have been analyzed for years without any vulnerabilities found.

    [22:00:32] NordicJedi: the only way i can read this chatroom is if i imagine you're all dead
     

    #2
    luv2increase
    CLASSIFIED ULTRA Member
    • Total Posts : 5279
    • Reward points : 0
    • Joined: 2008/12/31 16:26:56
    • Status: offline
    • Ribbons : 8
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/08 22:28:23 (permalink)
    There is no way on earth it would be able to crack "any" of my TrueCrypt volumes.


    Some are 256-bit AES only -> System Drive
    "All" other are 256-bit AES, Twofish and Serpent with HMAC-Whirpool!!!  That with a crazy long, crazy combination password like I have would literally take every computer on earth millions of years to crack!


    Who do these ppl think they are kidding?  :)

    HEATWARE

    - Intel Core i7 920 @ 4.1Ghz 24/7
    * Have x5650 Xeon 6c/12t want to install!!!

    - Corsair Dominator 12GB
    - EVGA x58 Classified 760
    - MSI GTX 960
    - MegaRAID 9260-8i Raid Card
    - 4 x Samsung 850 EVO 120GB in Raid-0
    - 4 x Samsung EcoGreen 1.5TB
    - Thermaltake Toughpower 1200W
    - IKONIK Ra X10 SIM
    - Pioneer BD-RW
    - 46" Samsung LN46A630 1080p
    - Windows 10 Professional Build 10147
    #3
    SirMaster
    CLASSIFIED Member
    • Total Posts : 2321
    • Reward points : 0
    • Joined: 2006/07/01 23:58:20
    • Location: Sussex, WI
    • Status: offline
    • Ribbons : 21
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/08 22:53:40 (permalink)
    TrueCrypt is actually not that hard to get around depending on your you use it unfortunately.  If you have physical access to the machine using TrueCrypt volumes it's usually quite possible to get the key.

    The decryption key is stored in memory every time you access your encrypted volume.  Any small piece of malware that might slip in can easily steal the keys from needed to decrypt the volumes right from live memory.  Anti-malware really only useful against mainstream known stuff.  It's not too hard to write a small program and keep it to yourself that wont be detected by anti-malware.

    Another way is by using Firewire.  If your PC is turned on and even if it's locked or in sleep mode anyone can dump the entire contents of your RAM out to a storage device.  Firewire simply has a huge design flaw in that any device connected to it is automatically granted root access to all system memory.


    On the topic if brute forcing.  You would be surprised in the speed in which you can brute force passwords with large enough rainbow tables. Now that 3TB hard drives are out people can easily carry around their 3TB rainbow tables and brute force like never before.

    You can read up lots of possible attacks and vulnerabilities here:

    http://www.truecrypt.org/docs/paging-file
    http://www.truecrypt.org/docs/hibernation-file
    http://www.truecrypt.org/docs/memory-dump-files
    http://www.truecrypt.org/...nencrypted-data-in-ram
    http://www.truecrypt.org/docs/physical-security
    http://www.truecrypt.org/docs/malware
    http://www.truecrypt.org/../multi-user-environment
    http://www.truecrypt.org/...enticity-and-integrity
    http://www.truecrypt.org/...passwords-and-keyfiles
    http://www.truecrypt.org/docs/trim-operation
    http://www.truecrypt.org/docs/wear-leveling
    http://www.truecrypt.org/docs/reallocated-sectors
    http://www.truecrypt.org/docs/defragmenting
    http://www.truecrypt.org/...ournaling-file-systems
    http://www.truecrypt.org/docs/volume-clones

    As you can see, there are quite a few vulnerabilities.

    Here are some real examples of actual software that exists to take advantage of some of these vulnerabilities and attacks:

    http://www.mydigitallife.info/2008/07/24/bitlocker-filevault-dm-crypt-and-truecrypt-encryption-key-crack-via-dram-cold-boot-attack-with-program-source-code-download/

    http://www.lostpassword.com/hdd-decryption.htm


    There are definitely additional measures you can take to stay more secure but you can never be absolutely secure unfortunately. 

    As far as the software here: Passware.  It's actually quite fast at brute forcing Office and RAR encrypted files.  I have used it personally.  I have also used it to successfully decrypt a TrueCrypt volume from a laptop that had full disk encryption enabled but was left in sleep mode with a working Firewire port.  These were done as labs in my Security class in my Senior year at College last year so I do have at least a bit of experience with this stuff.  However I am no expert, experts have even more tricks up their selves  that I couldn't even imagine :P


    post edited by SirMaster - 2010/09/08 22:58:47
    #4
    lehpron
    Regular Guy
    • Total Posts : 16254
    • Reward points : 0
    • Joined: 2006/05/18 15:22:06
    • Status: offline
    • Ribbons : 191
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/08 22:59:59 (permalink)
    Companies don't build a product then wait for customers to buy it.  A lot of money is going into projects like this, investors and shareholders especially need gaurantees like pre-existing demand.  This latter part people around here seem to forget, let alone consider: Virturally every company will wait for demand before doing anything, meaning it doesn't matter if we don't get what is already being put to use.  

    If the only real factor in password breaking is time, then with enough hardware operating at once and that GPGPU tech is only improving, I have a hard time with the idea that products like this are unrealistic or impractical.
    post edited by lehpron - 2010/09/08 23:02:20

    For Intel processors, 0.122 x TDP = Continuous Amps at 12v [source].  

    Introduction to Thermoelectric Cooling
    #5
    TheCrazyCanuck
    CLASSIFIED Member
    • Total Posts : 2194
    • Reward points : 0
    • Joined: 2006/04/16 12:54:44
    • Location: Texas Yee-Haw!
    • Status: offline
    • Ribbons : 4
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/08 23:46:07 (permalink)
    hehe I just had a deja vous experience after reading lehpron's post :)

    I'm not an expert in cryptography but what I do know matches with what SirMaster said.  Brute force combined with dictionary attacks are not 100% effective but given the average user password, their lack of knowledge of what makes a password difficult to crack, and efficient hardware cracking platforms like GPGPU I wouldn't rule anything out.
    #6
    SirMaster
    CLASSIFIED Member
    • Total Posts : 2321
    • Reward points : 0
    • Joined: 2006/07/01 23:58:20
    • Location: Sussex, WI
    • Status: offline
    • Ribbons : 21
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/09 06:45:55 (permalink)
    TheCrazyCanuck

    hehe I just had a deja vous experience after reading lehpron's post :)

    I'm not an expert in cryptography but what I do know matches with what SirMaster said.  Brute force combined with dictionary attacks are not 100% effective but given the average user password, their lack of knowledge of what makes a password difficult to crack, and efficient hardware cracking platforms like GPGPU I wouldn't rule anything out.


    Right.  Though strong passwords and practices like salting the hashes make it much harder to use things like rainbow tables and brute force but there are other attacks that exist.
     
    Also I like this relevent comic:
    http://imgs.xkcd.com/comics/security.png
    post edited by SirMaster - 2010/09/09 06:50:19
    #7
    rhussain
    FTW Member
    • Total Posts : 1679
    • Reward points : 0
    • Joined: 2009/07/17 06:58:49
    • Location: Infinite Loop
    • Status: offline
    • Ribbons : 7
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/09 07:11:04 (permalink)
    honestly if someone wanted to break into your house and have physical acess to your machine, I dont think they would waste time trying to crack your encryption. They would most likely just grab the entire pc and leave LOL. the best protection is to bolt your case to the ground or stick it inside of a cabinet (rackmount, with room for pc's) and lock it down.

    Brute force iso nly powerful as the dictionary you're using. Modern password encryptions could be cracked, but they are difficult/timely to decrypt. 128bit can easily be cracked. AES 256 is far difficult. I cant go into specifics here, the process is forbidden/illegal and DOES NOT involve dictionary attacks. If you want to know more about how it works visit the backtrack forums. There si a thread that examine all levels of password encryption on popular OS's and tools including truecrypt.
    post edited by rhussain - 2010/09/09 07:17:55

     



    #8
    Rudster816
    CLASSIFIED Member
    • Total Posts : 4353
    • Reward points : 0
    • Joined: 2007/08/03 22:07:51
    • Location: Eastern Washington
    • Status: offline
    • Ribbons : 18
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/09 08:22:38 (permalink)
    rhussain

    honestly if someone wanted to break into your house and have physical acess to your machine, I dont think they would waste time trying to crack your encryption. They would most likely just grab the entire pc and leave LOL. the best protection is to bolt your case to the ground or stick it inside of a cabinet (rackmount, with room for pc's) and lock it down.

    Brute force iso nly powerful as the dictionary you're using. Modern password encryptions could be cracked, but they are difficult/timely to decrypt. 128bit can easily be cracked. AES 256 is far difficult. I cant go into specifics here, the process is forbidden/illegal and DOES NOT involve dictionary attacks. If you want to know more about how it works visit the backtrack forums. There si a thread that examine all levels of password encryption on popular OS's and tools including truecrypt.


    AES in itself can not be cracked in a reasonable time time frame with any amount of computing power thats reasonable for even a government. The encryption protocol can be attacked, but that has nothing to do with the encryption algorithm.

    AES-192 and AES-256 do have a related-key "vulnerability" (AES-128 does not however). With this attack you can crack something encrypted via AES-256 with a complexity of 2^99.5, and AES-192 with a complexity of 2^176. So with this attack, AES-256 is actually the weakest of AES versions.

    Also, cracking encryption algorithms isnt illegal in any way whatsoever, and in fact, is encouraged in order to create better algorithms. And AES-128 in itself is 99.999999% secure. Dont go running your mouth saying that AES-128 can be "easily cracked" when you have no idea what your talking about. Also, a non dictionary\brute force attack is attacking the protocol (as mentioned earlier) and would be just as vulnerable in AES-256 as in AES-128.

    Oh, and a brute force attack isnt a dictionary attack, so how is a brute force attack only as powerful as the dictionary your using? A brute force attack attempts to find the key by trying all possible combination, and comparing it to a unencrypted version or fragment, it doesnt use any type of insight as to what the password might be because it doesnt try passwords, it just tries the actual key used for encryption.

    [22:00:32] NordicJedi: the only way i can read this chatroom is if i imagine you're all dead
     

    #9
    rhussain
    FTW Member
    • Total Posts : 1679
    • Reward points : 0
    • Joined: 2009/07/17 06:58:49
    • Location: Infinite Loop
    • Status: offline
    • Ribbons : 7
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/09 08:31:36 (permalink)
    Good info Rudster816, however I can prove to you that AES 128 is quite easy to crack, but not in all scenarios. For example bitlocker/filevault on the windows/mac OS utilizes AES 128bit encryption. Now it is illegal for me to explain the process since it violates microsoft/apple's EULA. Here is a paper from a scientist at Princton University explaining exactly how it works. These are exploits carried out on the data that remains on RAM/OS in order to manipulate the encryption method, using the "Cold Boot" attack. But like I said before it wont work in every scenario. Apple has found a way to prevent this by enabling secure erase virtual ram by default.

    [link=http://citp.princeton.edu.nyud.net/pub/coldboot.pdf]http://citp.princeton.edu.yud.net/pub/coldboot.pdf
    [/link]
    post edited by rhussain - 2010/09/09 08:37:36

     



    #10
    SirMaster
    CLASSIFIED Member
    • Total Posts : 2321
    • Reward points : 0
    • Joined: 2006/07/01 23:58:20
    • Location: Sussex, WI
    • Status: offline
    • Ribbons : 21
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2010/09/09 10:21:53 (permalink)
    rhussain

    Good info Rudster816, however I can prove to you that AES 128 is quite easy to crack, but not in all scenarios. For example bitlocker/filevault on the windows/mac OS utilizes AES 128bit encryption. Now it is illegal for me to explain the process since it violates microsoft/apple's EULA. Here is a paper from a scientist at Princton University explaining exactly how it works. These are exploits carried out on the data that remains on RAM/OS in order to manipulate the encryption method, using the "Cold Boot" attack. But like I said before it wont work in every scenario. Apple has found a way to prevent this by enabling secure erase virtual ram by default.

    [link=http://citp.princeton.edu.nyud.net/pub/coldboot.pdf]http://citp.princeton.edu.yud.net/pub/coldboot.pdf
    [/link]


    I was talking about these methods earlier and I wouldn't call this "cracking the encryption".  Using this method of attack, it would not mater what type or how strong of encryption was used.  The attack is that the key is obtainable through memory and the real key is then used to decrypt the data.  It wouldn't matter even if the key was several kilobits long.
    #11
    wrenSmith
    New Member
    • Total Posts : 1
    • Reward points : 0
    • Joined: 2019/03/19 20:01:50
    • Status: offline
    • Ribbons : 0
    Re: GPU acceleration of RAR, TrueCrypt, and Office 2010 password recovery 2019/03/19 20:16:52 (permalink)
    The GPU has nothing to do with . If the rar password you use is complex, it takes more time to unlock. Otherwise, you don't need to spend too much time. There are many free ways to unlock rar, like using notepad and password-online. It is wise to use the software if the free method does not work.

    post edited by wrenSmith - 2019/03/22 00:55:39
    #12
    Jump to:
  • Back to Mobile