(Page 3 of 11)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Auditing » Passwords

Added 2005-11-30
by nein
Very simple SSH brute forcer. Nothing spectacular, single-threaded, but better than the expect script that's been floating around for ages.

Added 2005-11-30
by nein
Tool for converting AIX /etc/security/passwd files to the more common format to be used with john or other cracking utilities.

Advanced Archive Password Recovery
Added 2005-10-04
by ElcomSoft Co.Ltd.
Advanced Archive Password Recovery is a program to recover lost or forgotten passwords for ZIP(PKZip/WinZip), ARJ/WinARJ, RAR/WinRAR and ACE/WinACE (1.x) archives. Supports the customizable "brute-force" attack, effectively optimized for speed (for traditional ZIP encryption, up to 15 million passwords per second on Pentium 4); dictionary-based attack, and very fast and effective known-plaintext attack. Supports strong WinZip encryption (AES). Multilangual interface is provided.

Kmd5 a md5 brute force tool
Added 2005-08-29
by Kes
A pretty fast md5 hash cracker that supports list of md5 hash. Features wordlist attack, combo wordlist attack, incremental attack, stdin mode to use with john the ripper as word generator, partial hash checking to crack partial hashes.

Kr4cker II
Added 2005-08-18
by Black List Software
This new release of Kr4ck3r comes equipped with many new features which enhance and simplify the process of auditing MD5 hash. We have built on the concept of clones by introducing Virtual Clones which run logically in the background while auditing. Also, we've included hands-free progression through-out the entire auditing process. Knowing the last line of defense is a strong password, we have included a totally new feature to allow operators to audit Md5 hash stored in a remote database. With a totally new design and focus on detail, this version has certainly become the ultimate MD5 hash auditor.

Proactive Password Auditor
Added 2005-07-30
by ElcomSoft Co.Ltd.
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks. Proactive Password Auditor helps secure networks by executing an audit of account passwords, and exposing insecure account passwords. If it is possible to recover the password within a reasonable time, the password is considered insecure. The software supports a few different methods of obtaining password hashes for further attack/audit: from dump files (generated by 3rd party tools like pwdump/pwdump2/pwdump3), Registry of local computer, binary Registry files (SAM and SYSTEM), memory of local computer, and memory of remote computers (Domain Controllers), including ones running Active Directory. The product features brute-force and dictionary attacks on LM and NTLM password hashes, effectively optimized for speed, plus "rainbow" attack, that uses pre-computed hash tables that allow to find most passwords in minutes instead of days or weeks.

Proactive System Password Recovery
Added 2005-07-30
by ElcomSoft Co.Ltd.
Proactive System Password Recovery is a program to recover all types of Windows passwords: logon password (when user is logged on and has Admin privileges), screensaver password, .NET Passport password, RAS and dial-up passwords, passwords to shared resources, SYSKEY startup password, passwords stored in cached credentials, Wireless (WEP and WPA-PSK) encryption keys etc. The program also shows all users and groups (with their properties), allows to run any programs in other user's context, show password history hashes, read password hashes from SAM and SYSTEM files, read Protected Storage records, decrypt Windows scripts, reveal passwords hidden under the asterisks, enable disabled controls, and run brute-force and dictionary attacks on PWL files (Windows 9x). Finally, it shows product IDs and CD keys for Windows, Microsoft Office and other Microsoft software installed.

LC 5
Added 2005-04-25
by @stake
LC 5 is the latest version of L0phtCrack, the award-winning password auditing and recovery application used by thousands of companies worldwide. Using multiple assessment methods, LC 5 reduces security risk by helping administrators to: * Identify and remediate security vulnerabilities that result from the use of weak or easily guessed passwords * Recover Windows and Unix account passwords to access user and administrator accounts whose passwords are lost or to streamline migration of users to another authentication system * Rapidly process accounts using pre-computed password tables* that contain trillions of passwords

Added 2005-04-06
by Roni Bachar & Sol Zehnwirth
ldapenum is a perl script designed to enumerate system and password information from domain controllers using the LDAP service when IPC$ is locked. The script has been tested on windows and linux.

Added 2005-03-07
by Black List Software
This is the ultimate MD5 cracker having both a built-in brute-force and dictionary attack functionality.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus