Hacker
Professional
- Messages
- 1,041
- Reaction score
- 850
- Points
- 113
A direct search for the values of a certain parameter (for example, a password) was relevant at all times. The slowness of the method has always been compensated for by using the correct algorithms, and later rainbow tables and calculations on the video adapter.
01. JOHN THE RIPPER
John the Ripper is the oldest (since 1996) and still actively developed Open Source tool for auditing password hash databases, as well as for recovering forgotten passwords. John runs on UNIX-like systems (including OS X), Windows, and a number of other systems, and is usually managed from the command line. In the so-called jumbo versions developed by the international community of developers, more than 200 types of hashes, authentication methods, encrypted secret keys, archives, "office" files, file systems, databases of password managers, Bitcoin wallets, etc. are supported in total.
02. L0PHTCRACK
A program for auditing and restoring Windows passwords. Allows you to recover user passwords using a dictionary attack, a hybrid dictionary attack and sequential search, or a sequential search attack. It works on all Windows (starting with XP), as well as most *nix systems. You can use third-party programs to export passwords from remote machines for hacking. There is a built-in scheduler that allows you to conduct audits at specified time intervals.
03. CAIN AND ABEL
Do you need to extract passwords and personal data stored in the browser? Not a problem. Click on the desired icon and they are yours. Are you interested in passes that are continuously transmitted over your LAN? In this case, use the built-in sniffer. With the help of 15 built-in utilities, Cain & Abel can crack different types of hashes, conduct research on the wireless network, and perform a number of other unique actions aimed at selecting or splitting passwords.
04. OCLHASHCAT
GPU password brute force. Shows the best results for brute-force search. The best utility for targeted search of a single hash (search by chartsets). The lite version is 30-40% faster, but supports significantly fewer hash types than the plus version. The program is designed to work with discrete graphics cards from both AMD and NVIDIA and supports the following algorithms: MD5, SHA1, MySQL> v4. 1, MD4, NTLM, Domain Cached Credentials, SHA256.
05. RAINBOWCRACK
What makes it different from the usual brute-forces? Ordinary hackers generate all possible variants of the text, calculate the hash from each one, and compare it with the desired value. RainbowCrack works differently: it checks the desired hash by comparing it with the values from the pre-calculated table. Thus, thanks to the rainbow table method, the time for calculating hashes is saved, and only comparison is spent, which allows you to quickly get the result.
01. JOHN THE RIPPER
John the Ripper is the oldest (since 1996) and still actively developed Open Source tool for auditing password hash databases, as well as for recovering forgotten passwords. John runs on UNIX-like systems (including OS X), Windows, and a number of other systems, and is usually managed from the command line. In the so-called jumbo versions developed by the international community of developers, more than 200 types of hashes, authentication methods, encrypted secret keys, archives, "office" files, file systems, databases of password managers, Bitcoin wallets, etc. are supported in total.
02. L0PHTCRACK
A program for auditing and restoring Windows passwords. Allows you to recover user passwords using a dictionary attack, a hybrid dictionary attack and sequential search, or a sequential search attack. It works on all Windows (starting with XP), as well as most *nix systems. You can use third-party programs to export passwords from remote machines for hacking. There is a built-in scheduler that allows you to conduct audits at specified time intervals.
03. CAIN AND ABEL
Do you need to extract passwords and personal data stored in the browser? Not a problem. Click on the desired icon and they are yours. Are you interested in passes that are continuously transmitted over your LAN? In this case, use the built-in sniffer. With the help of 15 built-in utilities, Cain & Abel can crack different types of hashes, conduct research on the wireless network, and perform a number of other unique actions aimed at selecting or splitting passwords.
04. OCLHASHCAT
GPU password brute force. Shows the best results for brute-force search. The best utility for targeted search of a single hash (search by chartsets). The lite version is 30-40% faster, but supports significantly fewer hash types than the plus version. The program is designed to work with discrete graphics cards from both AMD and NVIDIA and supports the following algorithms: MD5, SHA1, MySQL> v4. 1, MD4, NTLM, Domain Cached Credentials, SHA256.
05. RAINBOWCRACK
What makes it different from the usual brute-forces? Ordinary hackers generate all possible variants of the text, calculate the hash from each one, and compare it with the desired value. RainbowCrack works differently: it checks the desired hash by comparing it with the values from the pre-calculated table. Thus, thanks to the rainbow table method, the time for calculating hashes is saved, and only comparison is spent, which allows you to quickly get the result.
