(Page 4 of 11)   < Prev  1 2 3 4 5 6 7 8 9  Next >

Category: Auditing » Passwords

Added 2005-03-07
by OverIP
This is a very reliable and fast mass scanner for Cisco router with telnet/enable default password.

Added 2004-09-07
by Patrik Karlsson
A CIFS/SMB password scanner based on the jcifs implementation. The scanner and jcifs are both 100% pure java, making it possible to run the scanner on a few different platforms. CifsPwScanner is released under the GPL Licence

Lepton's Crack
Added 2004-07-26
by Lepton and Nekromancer
Lepton's Crack is a generic password cracker. It is easily-customizable with a simple plugin system and allows system administrators to review the quality of the passwords being used on their systems. It can perform a dictionary-based (wordlist) attack as well as a brute force (incremental) password scan. It supports standard MD4 hash, standard MD5 hash, NT MD4/Unicode, Lotus Domino HTTP password (R4), and SHA-1 hash formats. LM (LAN Manager) plus appending and prepending

John the Ripper
Added 2004-02-24
by Solar Designer
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches.

Distributed John
Added 2003-11-19
by Luis Parravicini
DJohn is a parallel password cracker. It consists of a server that coordinates the work among several clients; the cracking in itself is done by John the Ripper.

Added 2003-11-12
by Ian Macdonald
Ruby/Password is a set of useful methods for creating, verifying, and manipulating passwords. It includes an interface to CrackLib, a library commonly used for checking password strength. It is intended to be used by system administrators who need to write Ruby programs that prompt for, generate, verify, and encrypt passwords.

Added 2003-07-04
by Domenico Andreoli
python-crack is a module that provides Python programs with the ability to evaluate password strength. It uses the well known cracklib toolkit, hence the name.

Cain & Abel
Added 2003-06-03
by mao
Cain & Abel v2.5 is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network cracking encrypted passwords using Dictionary & Brute-Force attacks, decoding scrambled passwords, revealing password boxes and analyzing routing protocols. This version ships a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LAN by hijacking IP traffic of multiple hosts at the same time, routing protocols authentication monitors and routes extractor, new crackers for password hashes (NTLMv2, Cisco Type-5...) and other utilities like the SID-Scanner, the NT Hash-Dumper (works with Syskey enabled), the Abel Remote Console, the MAC Scanner and the TCP/UDP/ICMP Traceroute + DNS Resolver + Netmask Discovery + WHOIS resolver (extract informations from RIPE's Database).

Added 2003-01-16
by Network Intelligence India Pvt. Ltd.
forceSQL is a password auditing tool for MS SQL Servers. It audits accounts by guessing passwords on SQL Databases. It uses both brute-force and dictionary attacks. It works much faster than other such tools because it bypasses the SQL ODBC API and talks directly to the network layer by constructing its own login packets.

Added 2002-09-03
by NTSleuth
Brute force password guessing utility for Microsoft SQL Server. Ability to scan a range of IP addresses with an optional dictionary file. Ability to create an administrative NT backdoor account.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus