WinPassword Benchmarks |
1. LANMAN hash is known
1a) Brute-force attack using CPU (any password length, up to
14 characters)
letters-only passwords: ~5 minutes
alphanumerical passwords: ~50
minutes
arbitrary passwords: 80
hours
Recovery time does not depend on number of passwords to
recover.
1b) Smart Rainbow Tables Recovery:
One password: 11 minutes (worst case, 2 minutes typical time)
Three passwords: 15 minutes (worst case, 5 minutes typical time)
Ten passwords: up to 28 minutes
100 passwords: up to 3 hours 20 minutes
2) Recover passwords by NT hash (LANMAN hash is unknown)
2a) Brute-force attack using CPU
Character Set \
Password Length |
5 symbols or less |
6 |
7 |
8 |
9 |
10 |
lower case letters only |
instant |
9 seconds |
4 minutes |
1.5 hours |
44 hours |
47 days |
lower case letters and digits |
instant |
1 minunte |
38 minutes |
23 hours |
34 days |
4 years |
Mixed case letters |
10 s |
10 minutes |
9 hours |
18 days |
31 month |
too long |
Mixed case letters and digits |
26 s |
28 minutes |
28 hours |
73 days |
too long |
too long |
All symbols |
4 min |
7 hours |
25 days |
7 years |
too long |
too long |
Recovery time does not depend on number of passwords to
recover.
2b) Brute-force attack using CPU + GPU (GTX295)
Character Set \
Password Length |
5 symbols or less |
6 |
7 |
8 |
9 |
10 |
lower case letters only |
instant |
instant |
8 seconds |
4 minutes |
1.5 hours |
39 hours |
lower case letters and digits |
instant |
instant |
1.5 minutes |
47 minutes |
28 hours |
43 days |
Mixed case letters |
instant |
20 sec |
17 minutes |
15 hours |
32 days |
4.5 years |
Mixed case letters and digits |
instant |
1 minutes |
1 hour |
60 hours |
5 month |
too long |
All symbols |
8 sec |
13 minutes |
21 hours |
84 days |
too long |
too long |
Recovery time does not depend on number of passwords to
recover.
[ WinPassword Home Page ]
|