Password Cracking question, what do we use instead of rainbow tables? – Digitalmunition

Home Forums Password Cracking question, what do we use instead of rainbow tables?

This topic contains 1 reply, has 2 voices, and was last updated by  JackedRightUp 1 month, 3 weeks ago.

  • Author
  • #365738


    Well I’ve been thinking about building a PW cracking rig for a while on what is worth putting money into. I found [this]( article and was intrigured. Especially when I came across this:

    >Rainbow tables are an ancient relic of the past that simply have no place in modern password cracking. Modern password cracking is highly dynamic and requires agility, flexibility, and scalability. Rainbow tables are static, rigid, and not at all scalable – they are the antithesis of modern password cracking. When you look at what the world’s most successful password crackers — Team Hashcat, Team CynoSure Prime, Team Radeon 9800 — you’ll see that none of them have touched rainbow tables in nearly a decade.

    But the article doesn’t mention what has replaced them, what is being used today. I’m not aware of anything new in the world, but I don’t think the writer is wrong as a friend recently went to download to download the defcon tables and found most of the torrents are dead or damaged.

    I know password lists/dictionaries are still being distributed but i’d be surprised to know we are going backwards if that is the case.

    I know that distributed architecture is the best for cracking but that is out of my wheelhouse and it still doesn’t explain what has replaced tables.

  • #365739


    Breaches, dictionaries and masks.

  • #365740


    A rainbow table typically focuses on one hash type, with one cost/iteration value. So you would need multiple tables for general cracking purposes. That starts taking up a lot of disk space, which may be more difficult to manage. Just one [NTLM 9-character rainbow table]( weights in at 6.7 terabytes. And if you don’t have the right table type you can’t crack any of the passwords.

    Live GPU cracking for most hash types is king. GPUs and the right software (like Hashcat) can provide you with adequate speed and flexibility to attempt to crack just about any hash type. As you mention, GPU cracking can scale fairly well, either with multiple cards in a single system or distributed.

    Plus, our knowledge of common password formats has increased a ton in the past few decades thanks to large password database breaches and information sharing between password crackers. So while GPUs can’t crack all passwords, they tend to be pretty effective (90%+) for most environments. Head to head GPUs aren’t as fast as rainbow tables, but they tend to come out ahead in general usefulness.

  • #365741


    I had a red team exercise where they did a word scrape from companies website for industry terms, office locations and fed those into a word list generator with some other variables. 65% hit rate in 24 hours.

You must be logged in to reply to this topic.