{"id":720,"date":"2009-02-06T14:33:38","date_gmt":"2009-02-06T22:33:38","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=720"},"modified":"2009-02-06T14:33:38","modified_gmt":"2009-02-06T22:33:38","slug":"current-events-gpu-accelerated-wifi-cracking","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/06\/current-events-gpu-accelerated-wifi-cracking\/","title":{"rendered":"Current Events: GPU Accelerated WIFI Cracking"},"content":{"rendered":"<p>source articles:<\/p>\n<p>http:\/\/www.tgdaily.com\/content\/view\/41032\/144\/<\/p>\n<p>http:\/\/blogs.zdnet.com\/security\/?p=2419<\/p>\n<p>GPU (graphical processing units) are usually intended to be dedicated hardware to aid in rendering 2D and 3D images.\u00a0 However, as their computing and parallel processing abilities have grown to astounding levels, many have begun to think of ways to leverage this into other areas.\u00a0 Recently, ElcomSoft has released a wireless security auditing software which leverages the GPU to increase the number of passwords which can be brute forced per second &#8212; the Nvidia Tesla S1070, according to the tgdaily article, can test up to 52,400 passwords per second.\u00a0 To put that into perspective a\u00a0  Core 2 Quad Q6600 can try 1100 per second.\u00a0 Though is is a legitimate software released by a security auditing firm, it isn&#8217;t unreasonable to expect that this kind of password cracking capability will be attempted by skilled attackers.\u00a0 All of this is part of a larger trend of graphical technologies beginning to emerge as a security concern: graphics drivers often have kernel level operating system access, and plans for software that can use DirectX rendering remotely could be a major headache for preventing malicious graphical content from compromising the system (rumors are that flash 10 could have this capability.\u00a0 If so, this would add to flash&#8217;s history of security concerns).\u00a0 It isn&#8217;t really feasible to prevent more integrated graphics, so as always, careful engineering and threat modeling will be called for.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>source articles: http:\/\/www.tgdaily.com\/content\/view\/41032\/144\/ http:\/\/blogs.zdnet.com\/security\/?p=2419 GPU (graphical processing units) are usually intended to be dedicated hardware to aid in rendering 2D and 3D images.\u00a0 However, as their computing and parallel processing abilities have grown to astounding levels, many have begun to &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/06\/current-events-gpu-accelerated-wifi-cracking\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":120,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[178,179],"class_list":["post-720","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-gpu","tag-wireless-security"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=720"}],"version-history":[{"count":1,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/720\/revisions"}],"predecessor-version":[{"id":723,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/720\/revisions\/723"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}