5 programs for selecting passwords. Brute Force.

Hacker

Professional
Messages
1,041
Reaction score
850
Points
113
A direct search for the values of a certain parameter (for example, a password) was relevant at all times. The slowness of the method has always been compensated for by using the correct algorithms, and later rainbow tables and calculations on the video adapter.

01. JOHN THE RIPPER

John the Ripper is the oldest (since 1996) and still actively developed Open Source tool for auditing password hash databases, as well as for recovering forgotten passwords. John runs on UNIX-like systems (including OS X), Windows, and a number of other systems, and is usually managed from the command line. In the so-called jumbo versions developed by the international community of developers, more than 200 types of hashes, authentication methods, encrypted secret keys, archives, "office" files, file systems, databases of password managers, Bitcoin wallets, etc. are supported in total.

02. L0PHTCRACK

A program for auditing and restoring Windows passwords. Allows you to recover user passwords using a dictionary attack, a hybrid dictionary attack and sequential search, or a sequential search attack. It works on all Windows (starting with XP), as well as most *nix systems. You can use third-party programs to export passwords from remote machines for hacking. There is a built-in scheduler that allows you to conduct audits at specified time intervals.

03. CAIN AND ABEL

Do you need to extract passwords and personal data stored in the browser? Not a problem. Click on the desired icon and they are yours. Are you interested in passes that are continuously transmitted over your LAN? In this case, use the built-in sniffer. With the help of 15 built-in utilities, Cain & Abel can crack different types of hashes, conduct research on the wireless network, and perform a number of other unique actions aimed at selecting or splitting passwords.

04. OCLHASHCAT

GPU password brute force. Shows the best results for brute-force search. The best utility for targeted search of a single hash (search by chartsets). The lite version is 30-40% faster, but supports significantly fewer hash types than the plus version. The program is designed to work with discrete graphics cards from both AMD and NVIDIA and supports the following algorithms: MD5, SHA1, MySQL> v4. 1, MD4, NTLM, Domain Cached Credentials, SHA256.

05. RAINBOWCRACK

What makes it different from the usual brute-forces? Ordinary hackers generate all possible variants of the text, calculate the hash from each one, and compare it with the desired value. RainbowCrack works differently: it checks the desired hash by comparing it with the values from the pre-calculated table. Thus, thanks to the rainbow table method, the time for calculating hashes is saved, and only comparison is spent, which allows you to quickly get the result.
 
A direct search for the values of a certain parameter (for example, a password) was relevant at all times. The slowness of the method has always been compensated for by using the correct algorithms, and later rainbow tables and calculations on the video adapter.

01. JOHN THE RIPPER

John the Ripper is the oldest (since 1996) and still actively developed Open Source tool for auditing password hash databases, as well as for recovering forgotten passwords. John runs on UNIX-like systems (including OS X), Windows, and a number of other systems, and is usually managed from the command line. In the so-called jumbo versions developed by the international community of developers, more than 200 types of hashes, authentication methods, encrypted secret keys, archives, "office" files, file systems, databases of password managers, Bitcoin wallets, etc. are supported in total.

02. L0PHTCRACK

A program for auditing and restoring Windows passwords. Allows you to recover user passwords using a dictionary attack, a hybrid dictionary attack and sequential search, or a sequential search attack. It works on all Windows (starting with XP), as well as most *nix systems. You can use third-party programs to export passwords from remote machines for hacking. There is a built-in scheduler that allows you to conduct audits at specified time intervals.

03. CAIN AND ABEL

Do you need to extract passwords and personal data stored in the browser? Not a problem. Click on the desired icon and they are yours. Are you interested in passes that are continuously transmitted over your LAN? In this case, use the built-in sniffer. With the help of 15 built-in utilities, Cain & Abel can crack different types of hashes, conduct research on the wireless network, and perform a number of other unique actions aimed at selecting or splitting passwords.

04. OCLHASHCAT

GPU password brute force. Shows the best results for brute-force search. The best utility for targeted search of a single hash (search by chartsets). The lite version is 30-40% faster, but supports significantly fewer hash types than the plus version. The program is designed to work with discrete graphics cards from both AMD and NVIDIA and supports the following algorithms: MD5, SHA1, MySQL> v4. 1, MD4, NTLM, Domain Cached Credentials, SHA256.

05. RAINBOWCRACK

Onu olağan kaba kuvvetlerden farklı kılan nedir? Sıradan bilgisayar korsanları, metnin tüm olası çeşitlerini üretir, her birinden karmayı hesaplar ve istenen değerle karşılaştırır. RainbowCrack farklı çalışır: önceden hesaplanmış tablodaki değerlerle karşılaştırarak istenen karmayı kontrol eder. Böylelikle gökkuşağı tablosu yöntemi sayesinde, hash hesaplama süresinden tasarruf edilir ve sadece karşılaştırma harcanarak sonucu hızlı bir şekilde almanızı sağlar.
THANKS
 
Top