Tag: Password Cracking

The Forensic Analysis Toolkit (FATKit)

The Forensic Analysis Toolkit (FATKit) is a new cross-platform, modular, and extensible digital investigation framework for analyzing volatile system memory. The framework is intended for researchers, law enforcement professionals, and forensics analysts who are interested in extracting and interpreting relevant information in the wake of a crime or incident. FATKit was developed in response to …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/15/the-forensic-analysis-toolkit-fatkit/

RainbowCrack

RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers. A brute force hash cracker generate all possible plaintexts and compute the corresponding hashes on the fly, then compare the hashes …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/02/rainbowcrack-2/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Magnet RAM Capture

Magnet RAM Capture is a free imaging tool designed to capture the physical memory of a suspect’s computer, allowing investigators to recover and analyze valuable artifacts that are often only found in memory. Magnet RAM Capture has a small memory footprint, meaning investigators can run the tool while minimizing the data that is overwritten in …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/magnet-ram-capture/

SEANux

SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme. It is charged up with penetration testing tools and other useful applications for general purposes. http://seanux.sea.sy/#download

Permanent link to this article: http://www.darknessgate.com/2014/11/02/seanux/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

The Volatility Framework: Volatile memory artifact extraction utility framework

The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/03/12/the-volatility-framework-volatile-memory-artifact-extraction-utility-framework/

Helix3 [Commercial Version]

Helix3 Enterprise is an easy to use cyber security solution integrated into your network giving you visibility across your entire infrastructure revealing malicious activities such as Internet abuse, data sharing and harassment.  H3E also allows you to isolate and respond to incidents or threats quickly and without user detection through a central administration tool.   …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/14/helix3-commercial-version/

CAINE and NBCAINE

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/14/caine-and-nbcaine/

Cain & Abel

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2012/11/25/cain-abel/

Cain & Abel

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2012/11/25/cain-abel-2/