(Page 2 of 11)   < Prev  1 2 3 4 5 6 7  Next >

Category: Auditing » Passwords

MDCrack
Added 2006-09-07
by Gregory Duchemin
MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multi threading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s). This yields to phenomenal performance even on old generation multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program.

CryptoSearch
Added 2006-08-08
by Password Crackers, Inc.


Castor - Novell eDirectory Password Auditor
Added 2006-07-10
by Novacoast Inc.
Castor is a security audit tool for Novell eDirectory. · Check for weak passwords (Universal or NDS) · Check for improper rights given to administrators · Backup Universal passwords

Medusa
Added 2006-06-14
by Foofus Networks
Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net. It currently has modules for the following services: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module.

Advanced FTP Password Recovery
Added 2006-05-11
by Reactive Software
Advanced FTP Password Recovery is a program that will catch, sniff and show your forgotten FTP passwords. This FTP password finder is very easy to use and can recover passwords from all FTP clients including CuteFTP, WS_FTP, FileZilla, SmartFTP, FlashFXP and Bulletproof FTP. Your FTP password recovery is guaranteed!

Farabi HF Brute Forcer
Added 2006-05-10
by Sheran Gunasekera
Point this perl script to the Farabi Host Front Server that you want to test and give it a user name and/or password. Based on the response from the server, it will give you details on if the Username is invalid or Password is invalid. It can be used to find out valid users on a Farbi Host Front Server (after a few modifications are made). If the Host Front Server is running SSL, then run something like STunnel or SSLProxy and point it to the Farabi Host Front Server, then point the script to localhost.

FlashFXP Password Recovery
Added 2006-05-07
by Reactive Software
FlashFXP Password Recovery is a utility that will recover FTP passwords for all accounts set-up with FlashFXP. This tool works by decrypting the FTP password information from the registry and showing it in a simple way. Proxy password information is also shown if FlashFXP is set-up to connect to remote FTP servers through the proxy. All versions of FlashFXP FTP are supported. Recovery from external data files (Sites.dat) is also possible.

Argosy TelCrest Enterprise Password Safe
Added 2006-04-25
by Argosy TelCrest
Centralized password repository accessed via a web browser with multi-user access, audit logs, audit event email alerting, and much more.

Elcomsoft Distributed Password Recovery
Added 2006-02-15
by ElcomSoft Co.Ltd.
Elcomsoft Distributed Password Recovery (EDPR) offers administrators a comprehensive solution for recovering passwords to Microsoft Office documents when employees forget or lost their passwords. EDPR lets you coordinate all of the unused computing power of every computer on your LAN or WAN, and use distributed processing to restore the lost password by installing the "agents" onto as many computers on the network as the user desires; each of these agents uses brute force to try to recover the lost password. EDPR restores passwords for Word and Excel documents encrypted with 40 bit keys (Office 97/2000 compatible) as well as more recent documents (Office XP/2003) encrypted with CSP. Office 97/2000 documents can be also decrypted by recovery of encryption keys instead of password, and that type of attack gives a guaranteed result regardless of password length and complexity.

BobCat
Added 2006-02-04
by nmonkee
BobCat is a tool to aid a security consultant in taking full advantage of SQL injection vulnerabilities. It is based on a tool named "Data Thief" that was published as PoC by appsecinc. BobCat can exploit SQL injection bugs/opportunities in web applications, independent of language, but dependent on MS SQL as the back end DB.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus