Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Is a $30,000 GPU Good at Password Cracking?
    News

    Is a $30,000 GPU Good at Password Cracking?

    adminBy adminApril 8, 2026No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Specops transporter

    Compute power is growing at an extraordinary pace. The AI surge has driven massive investment in GPUs and specialized ‘accelerators’, with vendors building increasingly powerful hardware to train large language models.

    For cybersecurity professionals, that raises an interesting question. If the AI bubble cools and this hardware ends up sitting idle, could it be repurposed for password cracking? And if so, does that mean passwords are about to become obsolete?

    To explore that scenario, we compared two flagship AI accelerators, the Nvidia H200 and AMD MI300X, with Nvidia’s top consumer GPU, the RTX 5090. The goal was simple: seeing whether a $30,000 AI GPU actually has an advantage when cracking passwords.

    Setting up the test

    The Specops research team has previously published work examining how long it takes attackers to brute-force hashed passwords. In separate tests of MD5, bcrypt and SHA-256, we measured how quickly each algorithm could be cracked using the same hardware.

    To see how GPUs impact this process, we turned to Hashcat, one of the most widely used password recovery tools. Hashcat includes benchmarking capabilities that show how quickly different hardware can compute password hashes.

    This matters because password cracking is ultimately a numbers game. The faster a system can generate hashes, the faster it can test password guesses until it finds the correct one.

    For this comparison, we looked at Hashcat benchmark results for five commonly encountered hashing algorithms:

    • MD5
    • NTLM
    • bcrypt
    • SHA-256
    • SHA-512

    These cover the common algorithms found in an organization’s Active Directory, from older, fast hashes that are relatively easy to brute force, through to modern algorithms with far stronger cryptography.

    That provides a realistic base for our three high-end GPUs to face. These products broadly occupy a similar performance tier in their respective markets, making them useful reference points for comparing enterprise AI hardware with consumer GPUs.

    Verizon’s Data Breach Investigation Report found stolen credentials are involved in 44.7% of breaches. 

     

    Effortlessly secure Active Directory with compliant password policies, blocking 4+ billion compromised passwords, boosting security, and slashing support hassles!

    Try it for free

    The GPU password cracking results







    Algorithm 

    H200 Hashrate 

    MI300X Hashrate 

    RTX 5090 Hashrate 

    MD5 

    124.4 GH/s 

    164.1 GH/s 

    219.5 GH/s 

    NTLM 

    218.2 GH/s 

    268.5 GH/s 

    340.1 GH/s 

    bcrypt 

    375.3 kH/s 

    142.3 kH/s 

    304.8 kH/s 

    SHA-256 

    15092.3 MH/s 

    24673.6 MH/s 

    27681.6 MH/s 

    SHA-512 

    5173.6 MH/s 

    8771.4 MH/s 

    10014.2 MH/s 

    What is immediately clear is that across every algorithm tested, the RTX 5090 outperforms both AI accelerators in raw hash generation speed. Across multiple functions, the RTX 5090 hashes passwords at almost twice the speed of the H200.

    The price to performance comparison is striking. A single H200 is at least ten times the price of an RTX 5090, so you might reasonably expect far greater performance from the AI accelerator in a one-to-one comparison. That simply isn’t the case.

    Adding to this is that back in 2017, IBM built a password-cracking rig using eight Nvidia GTX 1080s, the flagship consumer GPU of the time.

    That system achieved an NTLM hash cracking rate of 334 GH/s. In other words, a nine-year-old consumer GPU rig delivers similar, or better, performance in password cracking as today’s flagship AI accelerators.

    So, when answering the question, ‘is a $30,000 GPU good at password cracking?’, the answer is clear: no.

    The real risk to organizations

    Password cracking doesn’t require exotic or specialized hardware. Professional crackers and attackers already have access to all the computing power they need to brute-force weak passwords. In our SHA-256 tests, a password using numbers, upper and lowercase letters, and symbols could be cracked in just 21 hours.

    That’s why enforcing stronger passwords is essential, and the most effective defense is length. A 15-character password using the same mix of character types, hashed with SHA-256, would take around 167 billion years to crack, even with powerful GPU hardware. At that point, brute-forcing simply isn’t a realistic attack.

    The bigger risk is passwords that have already been exposed in data breaches. This often happens through password reuse. You might require employees to create long, complex Active Directory passwords and store them securely.

    But that protection disappears if the same password is reused on personal devices, websites, or applications with weaker security controls.

    If attackers can link exposed credentials to a specific individual, it’s often straightforward to identify where they work and attempt the same password against corporate accounts. There is an entire underground market of initial access brokers who specialize in exactly this type of intrusion.

    This highlights the importance of having tools that can detect compromised passwords within your organization. Identifying exposed credentials early allows security teams to reset accounts and block attackers before those passwords are used to gain access.

    How Specops helps

    Tools like Specops Password Policy help here in two crucial ways:

    • Granular password policy management: Our solution allows security teams to implement fine-grained password policies well beyond those included in Active Directory. This includes support for passphrases, as well as readymade compliance templates to ensure your organization matches necessary standards. Dynamic feedback guides users to create strong passwords they remember but are difficult to crack.
    • Continuous scanning for breached passwords: The Breached Password Protection feature continuously scans your Active Directory against a database of more than 5 billion unique compromised passwords. Customizable messages alert users if their password is compromised.
    Specops Password Policy
    Specops Password Policy

    Ultimately, organizations shouldn’t rely on passwords as the only line of defense. Multi-factor authentication (MFA) provides an additional barrier that protects accounts even if a password is eventually recovered.

    Specops Secure Access delivers that additional layer of security to Windows Logon, RDP and VPN connections.

    Specops Secure Access
    Specops Secure Access

    If you’re interested in seeing how Specops can help harden your Active Directory against credential attacks, contact us today.

    Sponsored and written by Specops Software.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGitLab security advisory (AV26-327) – Canadian Centre for Cyber Security
    Next Article CISA Adds One Known Exploited Vulnerability to Catalog
    admin
    • Website

    Related Posts

    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    News

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026
    News

    How Secure by Design Helps Developers Build Secure Software

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.