Category Archive: Password Recovery

Crowbar

Crowbar (formally known as Levye) is a brute forcing tool that can be used during penetration tests. It was developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/08/09/crowbar-2/

Offline Windows Password & Registry Editor, Bootdisk / CD

I’ve put together a CD or USB Drive image which contains things needed to reset the passwords on most systems. The bootdisk should support most of the more usual disk controllers, and it should auto-load most of them. Both PS/2 and USB keyboard supported. More or less tested from NT3.5 up to Windows 8.1, including …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/11/offline-windows-password-registry-editor-bootdisk-cd/

LCP

Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. General features of this product: Accounts information import: import from local computer; import from remote computer; import from SAM file; import from .LC file; import from .LCS file; import from PwDump file; import from Sniff file; Passwords recovery: dictionary attack; …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/11/lcp/

Trinity Rescue Kit | CPR for your computer

Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. Since version 3.4 it has an easy to use scrollable text menu that allows anyone who masters a keyboard and some English to perform maintenance …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/11/trinity-rescue-kit-cpr-for-your-computer/

RainbowCrack

RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers. A brute force hash cracker generate all possible plaintexts and compute the corresponding hashes on the fly, then compare the hashes …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/02/rainbowcrack-2/

Wfuzz

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. Some features: * Multiple Injection points capability with multiple dictionaries * Recursion (When doing …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/26/wfuzz/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/23/crowbar/

Aircrack-ng

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/aircrack-ng-3/

John the Ripper password cracker

John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of “native” packages for the target operating systems and in general is meant …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/john-ripper-password-cracker/

Dropbox Decryptor

Dropbox® Decryptor (v1.3 released 23/06/2014) from Magnet Forensics is a free tool that will decrypt the Dropbox filecache.dbx and config.dbx files, which are both encrypted SQLite databases. These two locations store information about files that have been synched to the cloud using Dropbox. Like the filecache.dbx, the config.dbx file is a simple SQLite file. Once …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/dropbox-decryptor/

Page 1 of 212