Category Archive: Digital Forensic

Offline Windows Password & Registry Editor, Bootdisk / CD

I’ve put together a CD or USB Drive image which contains things needed to reset the passwords on most systems. The bootdisk should support most of the more usual disk controllers, and it should auto-load most of them. Both PS/2 and USB keyboard supported. More or less tested from NT3.5 up to Windows 8.1, including …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/11/offline-windows-password-registry-editor-bootdisk-cd/

LCP

Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. General features of this product: Accounts information import: import from local computer; import from remote computer; import from SAM file; import from .LC file; import from .LCS file; import from PwDump file; import from Sniff file; Passwords recovery: dictionary attack; …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/11/lcp/

Trinity Rescue Kit | CPR for your computer

Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. Since version 3.4 it has an easy to use scrollable text menu that allows anyone who masters a keyboard and some English to perform maintenance …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/11/trinity-rescue-kit-cpr-for-your-computer/

Matriux

The Matriux is a phenomenon that was waiting to happen. It is a fully featured security distribution based on Debian consisting of a powerful bunch of more than 300 open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/11/matriux-2/

Parrot Security OS

Parrot Security OS is a security oriented operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network. http://www.parrotsec.org/

Permanent link to this article: http://www.darknessgate.com/2015/03/09/parrot-security-os/

RainbowCrack

RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers. A brute force hash cracker generate all possible plaintexts and compute the corresponding hashes on the fly, then compare the hashes …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/02/rainbowcrack-2/

Wfuzz

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. Some features: * Multiple Injection points capability with multiple dictionaries * Recursion (When doing …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/26/wfuzz/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/23/crowbar/

Aircrack-ng

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/aircrack-ng-3/

John the Ripper password cracker

John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of “native” packages for the target operating systems and in general is meant …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/john-ripper-password-cracker/

Page 2 of 912345...Last »