Distributed brute-force attack on the CMS from the hoster's point of view. The best pen-tester tools: password brute force

Windows Password Kracker is free software   to recover lost or forgotten windows   passwords. It can quickly restore the original password from the LM hash (LAN Manager) or NTLM (NT LAN Manager).

Windows encrypts login passwords using LM or NTLM hash algorithms. Since one hash algorithm is used, you can not directly decrypt the hash to find out the password. In such cases, "Windows Password Kracker" can help in recovery windows passwords   through simple method   dictionary search (bruteforce).


FireMasterCracker is a free software for cracking the password wizard in Firefox. This is the Graphical version, the first-ever tool for recovering lost master passwords from Firefox.

The Firefox browser uses a master password to protect saved passwords from all visited websites. If this master password is forgotten, then there is no way to restore it and the user also loses all access to all Web sites.

In such cases, the "Fire Master Cracker" utility can help you recover the lost master password.


Master Password is used to protect logins, passwords and other information about visited websites stored in the firefox browser. If this master password is forgotten, then there is no way to recover the master password and the user loses all the passwords stored in it. However, now you can use FireMaster to restore forgotten master passwords and get back all the saved authentication data (logins and passwords to sites).


Appnimi Password Unlocker is a free, all-in-one universal password recovery tool different types   protected files, including ZIP, RAR, PDF, XLS, XLSX, etc.

This utility for password recovery, supports both the dictionary selection method and brute force brute force method, thus allowing the user to easily recover a password of any complexity.

Each of the teams] [their preferences for software and utilities for
  pen-test. After consulting, we found out that the choice is so different that you can
  make up a real gentleman's set of proven programs. On that and
decided. In order not to make a hodge-podge of solyanka, we have broken the whole list on topics - and in
  This time we will touch on utilities for selecting a password for various services.

Brutus AET2

Platform: Windows

The last release of the program was in 2000. For a long time there is no official
  site. But in this case Brutus AET2   It is still one of the most
  advanced bruteforers for basic Internet protocols. If you need to pick up
  password for HTTP (on those pages where authorization is used for
  login / password), arbitrary web-service with authorization via form, postal
  account, file or Telnet server, know: Brutus   - A great option.

In general, to select a password, you must specify the host and port of the service, select
  protocol, set the number of threads used (maximum 60), and
  time-out. For the sake of anonymity, you can connect a Sox or Proxy. Depending on the
  protocol also indicates a number of additional parameters. For example, to select
  password on some site (type bruteforce - HTTP Form), you must specify a method
  (POST or GET), to designate the form parameters (in Brutus a simple means
  for their analysis), and if necessary, to forge the cookie, including
  corresponding option.

Selection is carried out in two ways: by dictionary, and the program has
  Several built-in utilities for working with large lists of passwords, or with
  using stupidly generated passwords. In the latter case, it is necessary
  designate the symbols that will be used to compose the pass.

Universal brutforser for HTTP protocols FORM, TELNET, POP3, FTP.

John the Ripper

For brute force RPD-akkov.

RainbowCrack

Site:
  project-rainbowcrack.com
  Platform: Unix, Windows

Usually, the hashed version of the password is stored in the open access   and it is known,
  by what algorithm this hash was obtained (for example MD5), but the inverse transformation
  It is considered too complex operation, requiring, in the general case, a search of all
  possible combinations - this is the basis for the security of many modern
  systems. If you have sorted hash tables and their corresponding passwords,
  We obtain a system which, using a fast binary table search, can
  receive a reverse hash conversion to a password for any existing
  hashing algorithm.

The main problem: the tables of all possible passwords are too large
  volume on disks. Therefore, the original table format is used: hashes
  are assembled into chains of several thousand combinations - each following combination
is obtained from the previous one by the next application of the same hash function. AT
  Only the beginning and the end of each such chain is written in the table. In order to
  To find the password on such table, it is necessary to apply to the given hash in the same way
  The hash function is several thousand times (depending on the length used
  chains) and on the next iteration we get a hash, which is the end of one of the
  chains in our tables. Then we run this chain anew from the initial
  hash to the required and we find the combination preceding our hash - this and
  there is the password you are looking for.

RainbowCrack   allows us to use this approach. The meaning is,
  that it takes a long time to compile the tables, but the password is hacked
  hundreds of times faster than bruteforce. RainbowCrack   will help how to compile tables,
  and use them to crack the hash. By the way, spend a lot of time on
  compilation of tables is not necessary - they can be bought and partially downloaded from
  torrents.

Extremely fast password recovery by hash using
  Rainbow-tables.

Md5 Crack Monster v1.1

Site:
  www.darkc0de.com/c0de/perl/mcm.txt
  Platform: Unix, Windows

Before you crawl on the rampage, launching the hash brute force, do not be too lazy to break it
  on online databases. For example, in gdataonline.com contains more than a billion
  unique records, and this is only one of numerous projects (some of them
  see below). To simplify the busy work of checking the hash on various
  I recommend you a cool script Md5 Crack Monster, written in Perl.
  He checks the hash on a solid list of services and produces the result.

Search for the hash value in online databases.

THC PPTP bruter

Platform: Unix

Who said that it's impossible to select a password for the VPN account because of the features
  authorization? Nonsense! Guys from the world-known hacker group THC have long
  proved the opposite, releasing public-release tools THC-pptp-bruter. This program
  is a highly specialized brute-force for PPTP-protocol
  (1723 / TCP), which really works! 🙂 True, only in the event,
  when the server uses the Microsoft Window Chap V2 authorization. I hasten to please:
  most often it is she who is used, and as on Windows servers, and
  serious CISCO-systems. As for the old Window Chap V1, its support
  you probably have to implement yourself :))

The problem of implementing bruteforce is that Microsoft intentionally
  implemented in the PPTP-protocol protection system against bruteforce. If you do not go into
in detail, then its meaning was to set the limit: "in one second
  you can enter only one password. "Naturally, with such a speed of busting
  The hacker will not go far and the chances of finding the password will be reduced to zero. However, in
  implementation of the tradition was not without flaws, which were published on
  bugs, and the THC group successfully imported them in a specific program. Through
THC-pptp-bruter   You can circumvent Microsoft's limitations and achieve
  speed more than 300-400 passwords per second. This figure, naturally, is strong
  varies depending on the delay in delivering packets to the server, so that
  The greatest speed can be achieved in local Area Networks. Afflicts only that for
  pptp-bruter requires a pair of third-party libraries. Without them the program
  simply will not compile.

For the brute VPN connection.

CIFSPwScanner

Site:
  www.cqure.net/tools/
  Platform: Windows, Unix

Scanner for auditing the persistence of passwords from CIFS / SMB-resources. With his help, you
  cleverly you can select the necessary data to connect to the enemy ball in
  locale. The main thing is to correctly drive in the necessary command and prepare a dictionary
  For Brutus, filled with a variety of human thoughts and love. For
CIFSPwS   it looks like this: CifsPwScanner -t server -u users. Rest
  options you can look in mana to the program or in an interactive help.
CIFSPwScanner   is written in Java, and therefore can be run under any
  platform.

Selection of the password for the balls.

piggy 1.0.1

Site:
  www.cqure.net/tools/
  Platform: Windows

Multithreaded Microsoft SQL Server bruteforce, implemented as
  console application. Supports range scanning mode when
  A given password is checked at once by several servers that store databases. it
  especially important, when you performed a service scan of the NMAP subnet on port 1433
  (TCP), traditional for this service, received the necessary banner of the database, after
  which fed the received addresses piggy. Because the negligence of administrators
  often truly immeasurable, the probability of catch is very, very high. Besides
  of this piggy   works with your files, to conduct an attack on
  the dictionary.

Audit of MSSQL server passwords.

Hints for work with dictionaries

You can discard duplicate passwords in the dictionary file using standard
  means nicks. To do this, you need one single command:

cat words.txt | sort | uniq\u003e dictionary.txt

If you know that the password policy does not allow users
select a pass that is less than 6 characters long and containing at least one letter
  and the figure, then you can save a lot of time on the search, if previously
  discard all the impossible options. Together with THC Hydra is a wonderful
  utility pw-inspector, with the help of which it is easy to compose from an existing dictionary
  The new dictionary, which includes only the "correct" passwords. In our case, this is
  is done like this:

cat dictionary.txt | pw-inspector -m 6 -c 2 -n\u003e passlist.txt

WARNING

All programs are provided for information purposes only. When
  they can not be used for illegal purposes. Furthermore,
  this is directly prohibited by the licenses of most programs. Do not lose your head!

Brutus A2 - one of the most recognized programs for selecting passwords. Forgotten Password   - not a rare problem in the modern computer world. Mail, archives with important photos, access to your homepage in popular in social networks, as well as to other sites that require registration - all these are examples of using password protection. Vainly hoping for your memory or forgetting to write down the cherished numbers and letters, we run the risk of losing valuable information. In such cases, bruteforce (brute-force method) cracking passwords can be useful. Download brutus free in Russian you can directly from this page of our site.
  In most cases, people choose not too much complex passwords, so for the selection of a secret word it is very useful to use special lists of words. The dictionaries for brutus a2 are free, you can download it on the web, and you can use your own, which is more useful if the goal is yours personal password. To get the brutus a2 password cracker program free download here, just click on the button on the left under the lock picture. Selecting passwords by brute force requires a lot of time, but it's very simple, and if you are not a programmer or a hacker, then this method is for you.

Do you like the article? Share with friends: