V100 GPU Hashcat Performance Benchmark: Powerful Password Cracking Capability

V100 GPU Hashcat Performance Benchmark: Powerful Password Cracking Capability

V100's AI Training Capabilities

The V100's capabilities in AI training have been well-proven. It serves as the computational core of the Summit supercomputer and was among the first GPUs used by OpenAI for large model training. GPT-3, which marked a new breakthrough in artificial intelligence, was trained using V100 clusters. Although it has been on the market for 8 years and many V100s are beginning to retire, it remains a powerful GPU with substantial computing power.

Password Cracking Scenario Testing

As we all know, password cracking requires brute force methods that demand significant computational power. How does the V100 perform in this scenario? Hashcat is widely recognized as the most efficient software for hash decryption. We tested V100's hash computing (password cracking) capabilities by running Hashcat benchmark on a server equipped with four V100 GPUs. This capability has been leveraged by MyPassRecovery in their online service, building a powerful computational infrastructure. This is where MyPassRecovery has an advantage over other password recovery software.

Test Environment

  • GPU: 4 x Tesla V100-SXM2-16GB
  • Memory: 16GB per card
  • CUDA Version: 12.8
  • Hashcat Version: v6.2.5
  • Test Mode: Benchmark with optimized kernel

Benchmark Test Results

System Information

hashcat (v6.2.5) starting in benchmark mode

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

* Device #1: WARNING! Kernel exec timeout is not disabled.
             This may cause "CL_OUT_OF_RESOURCES" or related errors.
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch
* Device #2: WARNING! Kernel exec timeout is not disabled.
* Device #3: WARNING! Kernel exec timeout is not disabled.
* Device #4: WARNING! Kernel exec timeout is not disabled.

CUDA API (CUDA 12.8)
====================
* Device #1: Tesla V100-SXM2-16GB, 15830/16144 MB, 80MCU
* Device #2: Tesla V100-SXM2-16GB, 15830/16144 MB, 80MCU
* Device #3: Tesla V100-SXM2-16GB, 15830/16144 MB, 80MCU
* Device #4: Tesla V100-SXM2-16GB, 15830/16144 MB, 80MCU

Hash Algorithm Performance Results

MD5 (Hash-Mode 0)

Device #1: 55972.1 MH/s (47.17ms) @ Accel:256 Loops:1024 Thr:128 Vec:8
Device #2: 55967.9 MH/s (47.15ms) @ Accel:256 Loops:1024 Thr:128 Vec:8
Device #3: 55971.4 MH/s (47.15ms) @ Accel:256 Loops:1024 Thr:128 Vec:8
Device #4: 55775.6 MH/s (47.31ms) @ Accel:256 Loops:1024 Thr:128 Vec:8
Total Speed: 223.7 GH/s

SHA1 (Hash-Mode 100)

Device #1: 17705.3 MH/s (75.08ms) @ Accel:32 Loops:1024 Thr:512 Vec:1
Device #2: 17715.0 MH/s (75.06ms) @ Accel:32 Loops:1024 Thr:512 Vec:1
Device #3: 17687.4 MH/s (75.18ms) @ Accel:32 Loops:1024 Thr:512 Vec:1
Device #4: 17629.5 MH/s (75.42ms) @ Accel:32 Loops:1024 Thr:512 Vec:1
Total Speed: 70737.2 MH/s

SHA2-256 (Hash-Mode 1400)

Device #1: 7651.7 MH/s (86.93ms) @ Accel:32 Loops:512 Thr:512 Vec:1
Device #2: 7657.8 MH/s (86.90ms) @ Accel:32 Loops:512 Thr:512 Vec:1
Device #3: 7651.0 MH/s (86.95ms) @ Accel:32 Loops:512 Thr:512 Vec:1
Device #4: 7623.7 MH/s (87.27ms) @ Accel:32 Loops:512 Thr:512 Vec:1
Total Speed: 30584.3 MH/s

SHA2-512 (Hash-Mode 1700)

Device #1: 2405.6 MH/s (69.38ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Device #2: 2413.7 MH/s (69.15ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Device #3: 2413.7 MH/s (69.15ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Device #4: 2406.0 MH/s (69.37ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Total Speed: 9639.0 MH/s

NTLM (Hash-Mode 1000)

Device #1: 100.8 GH/s (25.64ms) @ Accel:128 Loops:1024 Thr:256 Vec:8
Device #2: 100.8 GH/s (25.66ms) @ Accel:128 Loops:1024 Thr:256 Vec:8
Device #3: 100.7 GH/s (25.64ms) @ Accel:128 Loops:1024 Thr:256 Vec:8
Device #4: 100.2 GH/s (25.78ms) @ Accel:128 Loops:1024 Thr:256 Vec:8
Total Speed: 402.5 GH/s

LM (Hash-Mode 3000)

Device #1: 49293.1 MH/s (26.70ms) @ Accel:128 Loops:1024 Thr:128 Vec:1
Device #2: 49349.2 MH/s (26.69ms) @ Accel:128 Loops:1024 Thr:128 Vec:1
Device #3: 49308.1 MH/s (26.70ms) @ Accel:128 Loops:1024 Thr:128 Vec:1
Device #4: 49151.6 MH/s (26.78ms) @ Accel:128 Loops:1024 Thr:128 Vec:1
Total Speed: 197.1 GH/s

Windows Authentication Performance

NetNTLMv1 / NetNTLMv1+ESS (Hash-Mode 5500)

Device #1: 54278.5 MH/s (48.05ms) @ Accel:512 Loops:512 Thr:128 Vec:2
Device #2: 54274.7 MH/s (48.06ms) @ Accel:512 Loops:512 Thr:128 Vec:2
Device #3: 54248.8 MH/s (48.05ms) @ Accel:512 Loops:512 Thr:128 Vec:2
Device #4: 54160.5 MH/s (48.14ms) @ Accel:512 Loops:512 Thr:128 Vec:2
Total Speed: 217.0 GH/s

NetNTLMv2 (Hash-Mode 5600)

Device #1: 3897.2 MH/s (85.69ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Device #2: 3897.9 MH/s (85.65ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Device #3: 3897.5 MH/s (85.67ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Device #4: 3888.0 MH/s (85.87ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Total Speed: 15580.5 MH/s

WiFi Security Performance

WPA-PBKDF2-PMKID+EAPOL (Hash-Mode 22000) [Iterations: 4095]

Device #1: 880.4 kH/s (91.30ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Device #2: 879.4 kH/s (91.17ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Device #3: 881.6 kH/s (91.19ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Device #4: 879.5 kH/s (91.40ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Total Speed: 3520.8 kH/s

Unix/Linux System Hashes

descrypt, DES (Unix), Traditional DES (Hash-Mode 1500)

Device #1: 1918.4 MH/s (87.00ms) @ Accel:16 Loops:1024 Thr:128 Vec:1
Device #2: 1922.3 MH/s (86.82ms) @ Accel:16 Loops:1024 Thr:128 Vec:1
Device #3: 1920.2 MH/s (86.93ms) @ Accel:16 Loops:1024 Thr:128 Vec:1
Device #4: 1914.7 MH/s (87.17ms) @ Accel:16 Loops:1024 Thr:128 Vec:1
Total Speed: 7675.5 MH/s

md5crypt, MD5 (Unix), Cisco-IOS $1$ (Hash-Mode 500) [Iterations: 1000]

Device #1: 17589.9 kH/s (52.58ms) @ Accel:128 Loops:250 Thr:512 Vec:1
Device #2: 17584.5 kH/s (52.57ms) @ Accel:128 Loops:250 Thr:512 Vec:1
Device #3: 17416.0 kH/s (52.57ms) @ Accel:128 Loops:250 Thr:512 Vec:1
Device #4: 17477.6 kH/s (52.94ms) @ Accel:128 Loops:250 Thr:512 Vec:1
Total Speed: 70068.0 kH/s

bcrypt $2*$, Blowfish (Unix) (Hash-Mode 3200) [Iterations: 32]

Device #1: 62762 H/s (94.89ms) @ Accel:256 Loops:32 Thr:24 Vec:1
Device #2: 62791 H/s (94.88ms) @ Accel:256 Loops:32 Thr:24 Vec:1
Device #3: 62482 H/s (95.30ms) @ Accel:256 Loops:32 Thr:24 Vec:1
Device #4: 62535 H/s (95.23ms) @ Accel:256 Loops:32 Thr:24 Vec:1
Total Speed: 250.6 kH/s

sha512crypt $6$, SHA512 (Unix) (Hash-Mode 1800) [Iterations: 5000]

Device #1: 383.4 kH/s (67.12ms) @ Accel:8192 Loops:256 Thr:64 Vec:1
Device #2: 384.1 kH/s (66.97ms) @ Accel:8192 Loops:256 Thr:64 Vec:1
Device #3: 379.5 kH/s (67.78ms) @ Accel:8192 Loops:256 Thr:64 Vec:1
Device #4: 384.0 kH/s (67.01ms) @ Accel:8192 Loops:256 Thr:64 Vec:1
Total Speed: 1531.0 kH/s

Kerberos Authentication

Kerberos 5, etype 23, AS-REQ Pre-Auth (Hash-Mode 7500)

Device #1: 1104.5 MH/s (75.60ms) @ Accel:32 Loops:1024 Thr:32 Vec:1
Device #2: 1105.7 MH/s (75.54ms) @ Accel:32 Loops:1024 Thr:32 Vec:1
Device #3: 1104.9 MH/s (75.57ms) @ Accel:32 Loops:1024 Thr:32 Vec:1
Device #4: 1101.8 MH/s (75.78ms) @ Accel:32 Loops:1024 Thr:32 Vec:1
Total Speed: 4417.0 MH/s

Kerberos 5, etype 23, TGS-REP (Hash-Mode 13100)

Device #1: 1142.9 MH/s (72.92ms) @ Accel:256 Loops:128 Thr:32 Vec:1
Device #2: 1142.6 MH/s (72.95ms) @ Accel:256 Loops:128 Thr:32 Vec:1
Device #3: 1143.0 MH/s (72.91ms) @ Accel:256 Loops:128 Thr:32 Vec:1
Device #4: 1140.8 MH/s (73.03ms) @ Accel:256 Loops:128 Thr:32 Vec:1
Total Speed: 4569.2 MH/s

File Encryption Formats

7-Zip (Hash-Mode 11600) [Iterations: 16384]

Device #1: 889.2 kH/s (82.10ms) @ Accel:32 Loops:4096 Thr:128 Vec:1
Device #2: 892.8 kH/s (82.18ms) @ Accel:32 Loops:4096 Thr:128 Vec:1
Device #3: 852.7 kH/s (82.12ms) @ Accel:32 Loops:4096 Thr:128 Vec:1
Device #4: 867.6 kH/s (82.30ms) @ Accel:32 Loops:4096 Thr:128 Vec:1
Total Speed: 3502.3 kH/s

RAR3-hp (Hash-Mode 12500) [Iterations: 262144]

Device #1: 88508 H/s (39.94ms) @ Accel:4 Loops:16384 Thr:512 Vec:1
Device #2: 88711 H/s (39.93ms) @ Accel:4 Loops:16384 Thr:512 Vec:1
Device #3: 88750 H/s (39.91ms) @ Accel:4 Loops:16384 Thr:512 Vec:1
Device #4: 87961 H/s (40.07ms) @ Accel:4 Loops:16384 Thr:512 Vec:1
Total Speed: 353.9 kH/s

RAR5 (Hash-Mode 13000) [Iterations: 32799]

Device #1: 92663 H/s (54.66ms) @ Accel:16 Loops:128 Thr:1024 Vec:1
Device #2: 92666 H/s (54.66ms) @ Accel:16 Loops:128 Thr:1024 Vec:1
Device #3: 92665 H/s (54.65ms) @ Accel:16 Loops:128 Thr:1024 Vec:1
Device #4: 92376 H/s (54.78ms) @ Accel:16 Loops:128 Thr:1024 Vec:1
Total Speed: 370.4 kH/s

KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Hash-Mode 13400) [Iterations: 24569]

Device #1: 112.3 kH/s (60.44ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Device #2: 112.3 kH/s (60.42ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Device #3: 112.3 kH/s (60.43ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Device #4: 111.9 kH/s (60.65ms) @ Accel:4 Loops:1024 Thr:512 Vec:1
Total Speed: 448.8 kH/s

TrueCrypt RIPEMD160 + XTS 512 bit (Hash-Mode 6211) [Iterations: 1999]

Device #1: 665.1 kH/s (55.66ms) @ Accel:64 Loops:64 Thr:256 Vec:1
Device #2: 668.4 kH/s (55.44ms) @ Accel:64 Loops:64 Thr:256 Vec:1
Device #3: 669.5 kH/s (55.44ms) @ Accel:64 Loops:64 Thr:256 Vec:1
Device #4: 668.0 kH/s (55.59ms) @ Accel:64 Loops:64 Thr:256 Vec:1
Total Speed: 2671.1 kH/s

Windows DPAPI

DPAPI masterkey file v1 (Hash-Mode 15300) [Iterations: 23999]

Device #1: 148.8 kH/s (93.43ms) @ Accel:16 Loops:512 Thr:512 Vec:1
Device #2: 148.8 kH/s (93.43ms) @ Accel:16 Loops:512 Thr:512 Vec:1
Device #3: 148.8 kH/s (93.43ms) @ Accel:16 Loops:512 Thr:512 Vec:1
Device #4: 148.3 kH/s (93.77ms) @ Accel:16 Loops:512 Thr:512 Vec:1
Total Speed: 594.8 kH/s

DPAPI masterkey file v2 (Hash-Mode 15900) [Iterations: 12899]

Device #1: 80312 H/s (77.98ms) @ Accel:4 Loops:512 Thr:512 Vec:1
Device #2: 80320 H/s (77.97ms) @ Accel:4 Loops:512 Thr:512 Vec:1
Device #3: 80327 H/s (77.98ms) @ Accel:4 Loops:512 Thr:512 Vec:1
Device #4: 79932 H/s (78.21ms) @ Accel:4 Loops:512 Thr:512 Vec:1
Total Speed: 320.9 kH/s

Other Encryption Systems

macOS v10.8+ (PBKDF2-SHA512) (Hash-Mode 7100) [Iterations: 1023]

Device #1: 988.1 kH/s (78.50ms) @ Accel:64 Loops:31 Thr:512 Vec:1
Device #2: 989.8 kH/s (78.46ms) @ Accel:64 Loops:31 Thr:512 Vec:1
Device #3: 989.2 kH/s (78.49ms) @ Accel:64 Loops:31 Thr:512 Vec:1
Device #4: 986.0 kH/s (78.71ms) @ Accel:64 Loops:31 Thr:512 Vec:1
Total Speed: 3953.1 kH/s

LastPass + LastPass sniffed (Hash-Mode 6800) [Iterations: 499]

Device #1: 5442.8 kH/s (42.88ms) @ Accel:16 Loops:124 Thr:1024 Vec:1
Device #2: 5442.3 kH/s (42.88ms) @ Accel:16 Loops:124 Thr:1024 Vec:1
Device #3: 5403.4 kH/s (42.91ms) @ Accel:16 Loops:124 Thr:1024 Vec:1
Device #4: 5420.1 kH/s (43.05ms) @ Accel:16 Loops:124 Thr:1024 Vec:1
Total Speed: 21708.6 kH/s

Bitcoin/Litecoin wallet.dat (Hash-Mode 11300) [Iterations: 200459]

Device #1: 8990 H/s (74.21ms) @ Accel:1024 Loops:1024 Thr:128 Vec:1
Device #2: 8946 H/s (74.59ms) @ Accel:1024 Loops:1024 Thr:128 Vec:1
Device #3: 8835 H/s (75.52ms) @ Accel:1024 Loops:1024 Thr:128 Vec:1
Device #4: 9011 H/s (74.09ms) @ Accel:1024 Loops:1024 Thr:128 Vec:1
Total Speed: 35782 H/s

Test Runtime Information

Started: Sun Aug 31 02:37:44 2025
Stopped: Sun Aug 31 02:47:47 2025
Total Runtime: 10 minutes 3 seconds

Performance Summary

Below are the performance data tables compiled from the benchmark results:

Primary Hash Algorithm Performance

Hash Algorithm Single Card Speed Four Cards Total
MD5 (Mode 0) ~56 GH/s 223.7 GH/s
SHA1 (Mode 100) ~17.7 GH/s 70.7 GH/s
SHA2-256 (Mode 1400) ~7.65 GH/s 30.6 GH/s
SHA2-512 (Mode 1700) ~2.41 GH/s 9.64 GH/s
NTLM (Mode 1000) ~100.8 GH/s 402.5 GH/s
LM (Mode 3000) ~49.3 GH/s 197.1 GH/s

Windows Authentication Hash Performance

Hash Type Four Cards Total
NetNTLMv1 (Mode 5500) 217.0 GH/s
NetNTLMv2 (Mode 5600) 15.6 GH/s

WiFi Password Cracking Performance

Protocol Type Four Cards Total Iterations
WPA-PBKDF2-PMKID+EAPOL (Mode 22000) 3,520.8 kH/s 4095

Unix/Linux Password Hash Performance

Hash Type Four Cards Total Iterations
descrypt (Mode 1500) 7,675.5 MH/s -
md5crypt (Mode 500) 70,068 kH/s 1000
bcrypt (Mode 3200) 250.6 kH/s 32
sha512crypt (Mode 1800) 1,531 kH/s 5000

Kerberos Authentication Performance

Protocol Type Four Cards Total
Kerberos 5 AS-REQ (Mode 7500) 4,417 MH/s
Kerberos 5 TGS-REP (Mode 13100) 4,569 MH/s

File Encryption Format Performance

File Format Four Cards Total Iterations
7-Zip (Mode 11600) 3,502.3 kH/s 16384
RAR3-hp (Mode 12500) 353.9 kH/s 262144
RAR5 (Mode 13000) 370.4 kH/s 32799
KeePass (Mode 13400) 448.8 kH/s 24569
TrueCrypt RIPEMD160 (Mode 6211) 2,671.1 kH/s 1999

Windows DPAPI Performance

Encryption Type Four Cards Total Iterations
DPAPI v1 (Mode 15300) 594.8 kH/s 23999
DPAPI v2 (Mode 15900) 320.9 kH/s 12899

Other Encryption Formats

Encryption Type Four Cards Total Iterations
macOS v10.8+ (Mode 7100) 3,953.1 kH/s 1023
LastPass (Mode 6800) 21,708.6 kH/s 499
Bitcoin wallet.dat (Mode 11300) 35,782 H/s 200459

Runtime Status Monitoring

The test ran for 10 minutes with moderate GPU load and good temperature control. Monitoring via nvidia-smi showed:

IMG_256

  • Moderate GPU utilization
  • Well-controlled temperatures
  • Stable power consumption

Performance Analysis

The test results reveal several key insights:

  1. Excellent Basic Hash Algorithm Performance: The V100 demonstrates outstanding performance on basic hash algorithms like MD5, SHA, and NTLM, with NTLM reaching an impressive 402.5 GH/s.

  2. Reasonable Iterative Hash Performance: For algorithms requiring extensive iterations like bcrypt and scrypt, performance meets expectations. These algorithms are specifically designed to resist brute force attacks.

  3. Cost-Performance Advantage: The V100's performance is comparable to the RTX 2080 Ti, but with better pricing in the second-hand market. For scenarios requiring large-scale password recovery or security testing, the V100 offers excellent value for money.

Conclusion

Despite being 8 years old, the V100 still demonstrates powerful computing capabilities in password cracking scenarios. For enterprise-level password recovery services, security auditing, and penetration testing applications, the V100 remains a worthy consideration. Particularly in the second-hand market, the V100's cost-performance advantage becomes even more apparent, providing an economical solution for building high-performance password cracking clusters.