Reading articles like this one makes me wonder, is this a real world problem?

Say that someone (or something) wanted to crack my FTP login. The cracking software can deliver so and so many million guesses per second, but the server that is under attack can't possibly serve up that many "incorrect password" replies. In what kind of scenario do I need to worry about brute forcing?

有帮助吗?

解决方案

If your database of password hashes is compromised, and they can try to crack it on their local machine

其他提示

The point of these devices is to brute-force a password hash (from a leaked database).
No server is involved.

If they were trying to crack your FTP login, they wouldn't need lots of GPUs; they would simply need lots of network bandwidth.

The article says this, "Tools like Gosney’s GPU cluster aren’t suited for an “online” attack scenario against a live system. Rather, they’re used in “offline” attacks against collections of leaked or stolen passwords that were stored in encrypted form, Thorsheim said."

The article you linked already gives the answer to your question:

Tools like Gosney’s GPU cluster aren’t suited for an “online” attack scenario against a live system. Rather, they’re used in “offline” attacks against collections of leaked or stolen passwords that were stored in encrypted form, Thorsheim said. In that situation, attackers aren’t limited to a set number of password attempts – hardware and software limitations are all that matter.

许可以下: CC-BY-SA归因
不隶属于 StackOverflow
scroll top