Famed Hacker Unveils Wild Crack-In-The-Box Password Cracker Fueled By Dozens Of RTX 4090s

A password cracking setup outfitted with multiple graphics cards.
Kevin Mitnick, a former black hat hooligan-turned-good-guy who spent several years in prison in the 1990s for various computer-related tomfoolery, is showing off a beastly setup outfitted with 30 high-end GeForce graphics cards. We know what you're wondering—can it run Crysis? It certainly has enough firepower to push pixels around like a schoolyard bully on steroids. But what his setup is really designed to do is to crack passwords with the same speed and ease it would take Hercules to crack a walnut.

Anyone who is not familiar with Mitnick can look him up on Google or visit the Wikipedia entry on him for a quick history lesson. His hacking days started in his pre-teen years and it only gets more interesting from there. The US Department of Justice and Federal Bureau of Investigation are certainly familiar with the man who is widely considered to be the world's most famous hacker—he eluded both agencies for years...up until he didn't.

A successful "Free Kevin" movement helped Mitnick earn an early release after spending more than five years behind bars. These days he spends his time as a highly sought-after security consultant. He's also the chief executive officer at Mitnick Security Consulting, and chief hacking officer at KnowBe4, among other roles on his ever-expanding resume.

Kevin Mitnick tweet showing off his password cracking setup.

In posts shared to both Facebook and Twitter, Mitnick uploaded photos of a "badass password cracker" that the team at KnowBe4 helped him set up and configure. The beastly configuration is outfitted with two dozen of NVIDIA's flagship consumer graphics cards, the GeForce RTX 4090 based on the Ada Lovelace GPU architecture, as well as six GeForce RTX 2080 cards based on Turing.

"This is what companies come up against when we are hired for Red Team engagements. Our team now has a new large group of GPUs to crack passwords much, much faster," Mitnick explains.

In security parlance, a Red Team engagement is essentially a simulated cyberattack. You can think of it as an intense security audit. Exposing vulnerabilities is inevitably part of the process, but that's not necessarily the main goal. These simulated attacks test a company's ability to detect and/or respond to security threats. In other cases, the objective is to compromise the network by getting the admin’s credentials, which can entail exploiting as many vulnerabilities as possible. The results are then wrapped in a report that companies can take and implement fixes for.

This process is of course authorized by the company. The idea is that a Red Team engagement can identify what works, what doesn't, and how an organization can be better prepared to protect itself and its data from actual cyberattacks.

Why lean so heavily on the GeForce RTX 4090? As we've written about before, NVIDIA's top consumer GPU is proven to be quite adept at cracking passwords. We can only imagine how a setup with 24 of these GPUs plus six older higher-tier GPUs would be at accomplishing the same task.