Top 10 Password Crackers

Top 10 Password Crackers

Top 10 assword Crackers http://sectools.org/crackers.html Nmap Security Scanner Intro Top 0 Password Crackers Ref Guide Install Guide After the tremendously successful 2000 and 2003 security tools surveys. Insecure.0rg is delighted to release Download this 2001 survey. I 2Fyodor3 asked users from the nmap4hackers mailing list to share their favorite tools. and Changelog 3.253 people responded. This allowed me to e(pand the list to 100 tools. and even subdivide them into Book categories. This is the category page for password crackers 44 the full network security list is available here. Docs Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me Security Lists saying 7I don8t know where to start9. Nmap Hackers Nmap Dev Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted Bugtraq as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken Full Disclosure on a Nmap mailing list. This audience also biases the list slightly toward 7attack9 hacking tools rather than en Test defensive ones. Basics More Each tool is described by one ore more attributes: Did not appear on the 2003 list Security Tools ass crackers Generally costs money. A free limited/demo/trial version may be available. Sniffers Vuln Scanners Works natively on Linu( Web scanners Wireless Works natively on 0penBSD. FreeBSD. Solaris. and/or other UNIX variants E(ploitation Works natively on Apple Mac 0S X acket crafters More Works natively on Microsoft Windows Site News Features a command4line interface Advertising About/Contact 0ffers a GUI 2point and click3 interface Source code available for inspection. Exploit World lease send updates and suggestions 2or better tool logos3 to Fyodor. If your tool is featured or you think your Sponsors: site visitors might enjoy this list. you are welcome to use our link banners. Here is the list. starting with the most popular: #1 Cain and Abel : The top password recovery tool for Windows UNIX users often smugly assert that the best free security tools support their platform first. and Windows ports are often an afterthought. They are usually right. but Cain A Abel is a glaring e(ception. This Windows4only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network. cracking encrypted passwords using Dictionary. Brute4Force and Cryptanalysis attacks. recording VoI conversations. decoding scrambled passwords. revealing password bo(es. uncovering cached passwords and analyBing routing protocols. It is also well documented. Also categoriBed as: packet sniffers #2 Cohn the Ripper : A powerful. fle(ible. and fast multi4platform password hash cracker Cohn the Ripper is a fast password cracker. currently available for many flavors of Uni( 211 are officially supported. not counting different architectures3. D0S. Win32. Be0S. and 0penVMS. Its primary purpose is to detect weak Uni( passwords. It supports several crypt233 password hash types which are most commonly found on various Uni( flavors. as well as Derberos AFS and Windows NT/2000/X LM hashes. Several other hash types are added with contributed patches. Eou will want to start with some wordlists. which you can find here. here. or here. 1 de 3 25/8/2011 08:59 Top 10 assword Crackers http://sectools.org/crackers.html #3 THC Hydra : A Fast network authentication cracker which supports many different services When you need to brute force crack a remote authentication service. Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols. including telnet. ftp. http. https. smb. several databases. and much more. Like THC Amap this release is from the fine folks at THC. #5 Aircrack : The fastest available WE /W A cracking tool Aircrack is a suite of tools for 802.11a/b/g WE and W A cracking. It can recover a 50 through 5124bit WE key once enough encrypted packets have been gathered. It can also attack W A 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump 2an 802.11 packet capture program3. aireplay 2an 802.11 packet injection program3. aircrack 2static WE and W A4 SD cracking3. and airdecap 2decrypts WE /W A capture files3. Also categoriBed as: wireless tools #5 L0phtcrack : Windows password auditing and recovery application L0phtCrack attempts to crack Windows passwords from hashes which it can obtain 2given proper access3 from stand4alone Windows workstations. networked servers. primary domain controllers. or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses 2dictionary. brute force. etc3. LC5 was discontinued by Symantec in 2001. then re4acquired by the original L0pht guys and reborn as LC1 in 2009. For free alternatives. consider 0phcrack. Cain and Abel. or Cohn the Ripper. #1 Airsnort : 802.11 WE Encryption Cracking Tool AirSnort is a wireless LAN 2WLAN3 tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions. computing the encryption key when enough packets have been gathered. Eou may also be interested in the similar Aircrack. Also categoriBed as: wireless tools #I SolarWinds : A plethora of network discovery/monitoring/attack tools SolarWinds has created and sells doBens of special4purpose tools targeted at systems administrators. Security4related tools include many network discovery scanners. an SNM brute4force cracker. router password decryption. a TC connection reset program. one of the fastest and easiest router config download/upload applications available and more. Also categoriBed as: traffic monitoring tools #8 wdump : A window password recovery tool wdump is able to e(tract NTLM and LanMan hashes from a Windows target. regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack4compatible form. and can write to an output file. #9 RainbowCrack : An Innovative assword Hash Cracker The RainbowCrack tool is a hash cracker that makes use of a large4scale time4memory trade4off. A traditional brute force cracker tries all possible plainte(ts one by one. which can be time consuming for comple( passwords. RainbowCrack uses a time4memory trade4off to do all the cracking4time computation in advance and store the results in so4called Jrainbow tablesJ. It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished. 2 de 3 25/8/2011 08:59 Top 10 assword Crackers http://sectools.org/crackers.html #10 Brutus : A network brute4force authentication cracker This Windows4only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTT . 0 3. FT . SMB. TELNET. IMA . NT . and more. No source code is available. UNIX users should take a look at THC Hydra. Show All Top 100 Network Security Tools 0r view by category: Application4Specific Scanners K assword Crackers K Encryption Tools K Disassemblers K Firewalls K Intrusion Detection Systems K Netcats K 0S Detection Tools K acket Crafting Tools K ort Scanners K Rootkit Detectors K Security40riented 0perating Systems K acket Sniffers K Vulnerability E(ploitation Tools K Traceroute Tools K Traffic Monitoring Tools K Vulnerability Scanners K Web Vulnerability Scanners K Wireless Tools L Nmap K Sec Tools K Mailing Lists K Site News K About/Contact K Advertising K rivacy M 3 de 3 25/8/2011 08:59.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us