This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Password. Show all posts
Showing posts with label Password. Show all posts

Hashcat v3.6.0 - World's Fastest and Most Advanced Password Recovery Utility


hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.

Installation
Download the latest release and unpack it in the desired location. Please remember to use 7z x when unpacking the archive from the command line to ensure full file paths remain intact.

GPU Driver requirements:
  • AMD GPUs on Windows require "AMD Radeon Software Crimson Edition" (15.12 or later)
  • AMD GPUs on Linux require "AMDGPU-PRO Driver" (16.40 or later)
  • Intel CPUs require "OpenCL Runtime for Intel Core and Intel Xeon Processors" (16.1.1 or later)
  • Intel GPUs on Windows require "OpenCL Driver for Intel Iris and Intel HD Graphics"
  • Intel GPUs on Linux require "OpenCL 2.0 GPU Driver Package for Linux" (2.0 or later)
  • NVIDIA GPUs require "NVIDIA Driver" (367.x or later)


Features

  • World's fastest password cracker
  • World's first and only in-kernel rule engine
  • Free
  • Open-Source (MIT License)
  • Multi-OS (Linux, Windows and OSX)
  • Multi-Platform (CPU, GPU, DSP, FPGA, etc., everything that comes with an OpenCL runtime)
  • Multi-Hash (Cracking multiple hashes at the same time)
  • Multi-Devices (Utilizing multiple devices in same system)
  • Multi-Device-Types (Utilizing mixed device types in same system)
  • Supports distributed cracking networks (using overlay)
  • Supports interactive pause / resume
  • Supports sessions
  • Supports restore
  • Supports reading password candidates from file and stdin
  • Supports hex-salt and hex-charset
  • Supports automatic performance tuning
  • Supports automatic keyspace ordering markov-chains
  • Built-in benchmarking system
  • Integrated thermal watchdog
  • 200+ Hash-types implemented with performance in mind
  • ... and much more

Algorithms

  • MD4
  • MD5
  • Half MD5 (left, mid, right)
  • SHA1
  • SHA-224
  • SHA-256
  • SHA-384
  • SHA-512
  • SHA-3 (Keccak)
  • BLAKE2b-512
  • SipHash
  • Skip32
  • RIPEMD-160
  • Whirlpool
  • DES (PT = $salt, key = $pass)
  • 3DES (PT = $salt, key = $pass)
  • ChaCha20
  • GOST R 34.11-94
  • GOST R 34.11-2012 (Streebog) 256-bit
  • GOST R 34.11-2012 (Streebog) 512-bit
  • md5($pass.$salt)
  • md5($salt.$pass)
  • md5(unicode($pass).$salt)
  • md5($salt.unicode($pass))
  • md5($salt.$pass.$salt)
  • md5($salt.md5($pass))
  • md5($salt.md5($salt.$pass))
  • md5($salt.md5($pass.$salt))
  • md5(md5($pass))
  • md5(md5($pass).md5($salt))
  • md5(strtoupper(md5($pass)))
  • md5(sha1($pass))
  • sha1($pass.$salt)
  • sha1($salt.$pass)
  • sha1(unicode($pass).$salt)
  • sha1($salt.unicode($pass))
  • sha1(sha1($pass))
  • sha1($salt.sha1($pass))
  • sha1(md5($pass))
  • sha1($salt.$pass.$salt)
  • sha1(CX)
  • sha256($pass.$salt)
  • sha256($salt.$pass)
  • sha256(unicode($pass).$salt)
  • sha256($salt.unicode($pass))
  • sha512($pass.$salt)
  • sha512($salt.$pass)
  • sha512(unicode($pass).$salt)
  • sha512($salt.unicode($pass))
  • HMAC-MD5 (key = $pass)
  • HMAC-MD5 (key = $salt)
  • HMAC-SHA1 (key = $pass)
  • HMAC-SHA1 (key = $salt)
  • HMAC-SHA256 (key = $pass)
  • HMAC-SHA256 (key = $salt)
  • HMAC-SHA512 (key = $pass)
  • HMAC-SHA512 (key = $salt)
  • PBKDF2-HMAC-MD5
  • PBKDF2-HMAC-SHA1
  • PBKDF2-HMAC-SHA256
  • PBKDF2-HMAC-SHA512
  • MyBB
  • phpBB3
  • SMF (Simple Machines Forum)
  • vBulletin
  • IPB (Invision Power Board)
  • WBB (Woltlab Burning Board)
  • osCommerce
  • xt:Commerce
  • PrestaShop
  • MediaWiki B type
  • WordPress
  • Drupal 7
  • Joomla
  • PHPS
  • Django (SHA-1)
  • Django (PBKDF2-SHA256)
  • Episerver
  • ColdFusion 10+
  • Apache MD5-APR
  • MySQL
  • PostgreSQL
  • MSSQL
  • Oracle H: Type (Oracle 7+)
  • Oracle S: Type (Oracle 11+)
  • Oracle T: Type (Oracle 12+)
  • Sybase
  • hMailServer
  • DNSSEC (NSEC3)
  • IKE-PSK
  • IPMI2 RAKP
  • iSCSI CHAP
  • CRAM-MD5
  • MySQL CRAM (SHA1)
  • PostgreSQL CRAM (MD5)
  • SIP digest authentication (MD5)
  • WPA
  • WPA2
  • NetNTLMv1
  • NetNTLMv1+ESS
  • NetNTLMv2
  • Kerberos 5 AS-REQ Pre-Auth etype 23
  • Kerberos 5 TGS-REP etype 23
  • Netscape LDAP SHA/SSHA
  • FileZilla Server
  • LM
  • NTLM
  • Domain Cached Credentials (DCC), MS Cache
  • Domain Cached Credentials 2 (DCC2), MS Cache 2
  • DPAPI masterkey file v1 and v2
  • MS-AzureSync PBKDF2-HMAC-SHA256
  • descrypt
  • bsdicrypt
  • md5crypt
  • sha256crypt
  • sha512crypt
  • bcrypt
  • scrypt
  • OSX v10.4
  • OSX v10.5
  • OSX v10.6
  • OSX v10.7
  • OSX v10.8
  • OSX v10.9
  • OSX v10.10
  • iTunes backup < 10.0
  • iTunes backup >= 10.0
  • AIX {smd5}
  • AIX {ssha1}
  • AIX {ssha256}
  • AIX {ssha512}
  • Cisco-ASA MD5
  • Cisco-PIX MD5
  • Cisco-IOS $1$ (MD5)
  • Cisco-IOS type 4 (SHA256)
  • Cisco $8$ (PBKDF2-SHA256)
  • Cisco $9$ (scrypt)
  • Juniper IVE
  • Juniper NetScreen/SSG (ScreenOS)
  • Juniper/NetBSD sha1crypt
  • Fortigate (FortiOS)
  • Samsung Android Password/PIN
  • Windows Phone 8+ PIN/password
  • GRUB 2
  • CRC32
  • RACF
  • Radmin2
  • Redmine
  • PunBB
  • OpenCart
  • Atlassian (PBKDF2-HMAC-SHA1)
  • Citrix NetScaler
  • SAP CODVN B (BCODE)
  • SAP CODVN F/G (PASSCODE)
  • SAP CODVN H (PWDSALTEDHASH) iSSHA-1
  • PeopleSoft
  • PeopleSoft PS_TOKEN
  • Skype
  • WinZip
  • 7-Zip
  • RAR3-hp
  • RAR5
  • AxCrypt
  • AxCrypt in-memory SHA1
  • PDF 1.1 - 1.3 (Acrobat 2 - 4)
  • PDF 1.4 - 1.6 (Acrobat 5 - 8)
  • PDF 1.7 Level 3 (Acrobat 9)
  • PDF 1.7 Level 8 (Acrobat 10 - 11)
  • MS Office <= 2003 MD5
  • MS Office <= 2003 SHA1
  • MS Office 2007
  • MS Office 2010
  • MS Office 2013
  • Lotus Notes/Domino 5
  • Lotus Notes/Domino 6
  • Lotus Notes/Domino 8
  • Bitcoin/Litecoin wallet.dat
  • Blockchain, My Wallet
  • Blockchain, My Wallet, V2
  • 1Password, agilekeychain
  • 1Password, cloudkeychain
  • LastPass
  • Password Safe v2
  • Password Safe v3
  • KeePass 1 (AES/Twofish) and KeePass 2 (AES)
  • JKS Java Key Store Private Keys (SHA1)
  • Ethereum Wallet, PBKDF2-HMAC-SHA256
  • Ethereum Wallet, SCRYPT
  • eCryptfs
  • Android FDE <= 4.3
  • Android FDE (Samsung DEK)
  • TrueCrypt
  • VeraCrypt
  • LUKS
  • Plaintext

Attack-Modes

  • Straight *
  • Combination
  • Brute-force
  • Hybrid dict + mask
  • Hybrid mask + dict
* accept Rules

Supported OpenCL runtimes

  • AMD
  • Apple
  • Intel
  • Mesa (Gallium)
  • NVidia
  • pocl

Supported OpenCL device types

  • GPU
  • CPU
  • APU
  • DSP
  • FPGA
  • Coprocessor

    mimipenguin - A Tool To Dump The Login Password From The Current Linux User


    A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz.

    Details
    Takes advantage of cleartext credentials in memory by dumping the process and extracting lines that have a high probability of containing cleartext passwords. Will attempt to calculate each word's probability by checking hashes in /etc/shadow, hashes in memory, and regex searches.

    Requires
    • root permissions

    Supported/Tested Systems
    • Kali 4.3.0 (rolling) x64 (gdm3)
    • Ubuntu Desktop 12.04 LTS x64 (Gnome Keyring 3.18.3-0ubuntu2)
    • Ubuntu Desktop 16.04 LTS x64 (Gnome Keyring 3.18.3-0ubuntu2)
    • XUbuntu Desktop 16.04 x64 (Gnome Keyring 3.18.3-0ubuntu2)
    • Archlinux x64 Gnome 3 (Gnome Keyring 3.20)
    • VSFTPd 3.0.3-8+b1 (Active FTP client connections)
    • Apache2 2.4.25-3 (Active/Old HTTP BASIC AUTH Sessions) [Gcore dependency]
    • openssh-server 1:7.3p1-1 (Active SSH connections - sudo usage)

    Notes
    • Password moves in memory - still honing in on 100% effectiveness
    • Plan on expanding support and other credential locations
    • Working on expanding to non-desktop environments
    • Known bug - sometimes gcore hangs the script, this is a problem with gcore
    • Open to pull requests and community research
    • LDAP research (nscld winbind etc) planned for future

    Development Roadmap
    MimiPenguin is slowly being ported to multiple languages to support all possible post-exploit scenarios. The roadmap below was suggested by KINGSABRI to track the various versions and features. An "X" denotes full support while a "~" denotes a feature with known bugs.

    Feature .sh .py
    GDM password (Kali Desktop, Debian Desktop) ~ X
    Gnome Keyring (Ubuntu Desktop, ArchLinux Desktop) X X
    VSFTPd (Active FTP Connections) X X
    Apache2 (Active HTTP Basic Auth Sessions) ~ ~
    OpenSSH (Active SSH Sessions - Sudo Usage) ~ ~



    Hashview - A Web Front-End For Password Cracking And Analytics


    Hashview is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. Hashview is a web application that manages hashcat ( https://hashcat.net ) commands. Hashview strives to bring constiency in your hashcat tasks while delivering analytics with pretty pictures ready for ctrl+c, ctrl+v into your reports.

    Requirements
    1. Hashcat installed and working ( https://hashcat.net/hashcat/ )
    2. Hashcat installed and working (just double checking)
    3. A working RVM environment ( https://rvm.io/rvm/install )

    Installation
    Involves installing mysql, resque, and a ruby app

    Install mysql & Redis

    sudo apt-get update
    sudo apt-get install mysql-server libmysqlclient-dev redis-server openssl rake
    [optional, but recommended]
    mysql_secure_installation

    Optimize the database

    vim /etc/mysql/my.cnf
    Add the following line under the [mysqld] section:
    innodb_flush_log_at_trx_commit  = 0
    restart mysqld
    service mysql restart

    Install RVM (recommended)

    https://rvm.io/rvm/install

    Setup Hashview

    Download Hashview

    git clone https://github.com/hashview/hashview

    Install gems (from hashview directory)

    Install ruby 2.2.2 via RVM (if using RVM (recommended))
    rvm install ruby-2.2.2
    Install dependencies
    gem install bundler
    bundle install

    Setup database connectivity

    cp config/database.yml.example config/database.yml
    vim config/database.yml

    Create database

    RACK_ENV=production rake db:setup

    DerbyCon 2016 Talk on Hashview




    Developing and Contributing
    Please see the Contribution Guide for how to develop and contribute.
    If you have any problems, please consult Issues page first. If you don't see a related issue, feel free to add one and we'll help.

    Authors
    Contact us on Twitter @caseycammilleri
    @jarsnah12
    Checkout www.shellntel.com


    John the Ripper 1.8.0-jumbo-1 - Fast Password Cracker


    John the Ripper is a free password cracking software tool. Initially developed for the Unix operating system, it now runs on fifteen different platforms (eleven of which are architecture-specific versions of Unix, DOS, Win32, BeOS, and OpenVMS). It is one of the most popular password testing and breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix versions (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL, and others.

    John the Ripper 1.8.0-jumbo-1 is based on today’s code from the bleeding-jumbo branch on GitHub, which we’ve tried to make somewhat stable lately in preparation for this release.

    You may notice that the source code archive size has increased from under 2 MB to over 20 MB. This is primarily due to the included .chr files, which are both bigger and more numerous than pre-1.8 ones. There are lots of source code additions, too.

    In fact:

    This is probably the biggest single jumbo update so far. The changes are too numerous to summarize – unfortunately, we haven’t been doing that during development, and it’d be a substantial effort to do it now, delaying the release to next year. So we chose to go ahead and release whatever we’ve got. (Of course, there are the many commit messages -but that’s not a summary.)

    A really brief summary, though, is that there are new “formats” (meaning more supported hash and “non-hash” types, both on CPU and on GPU), various enhancements to existing ones, mask mode, better support for non-ASCII character sets, and of course all of 1.8.0’s features (including –fork and –node). And new bugs. Oh, and we’re now using autoconf, meaning that you need to “./configure” and “make”, with all the usual pros and cons of this approach. There’s a Makefile.legacy included, so you may “make -f Makefile.legacy” to try and build JtR the old way if you refuse to use autoconf… for now…and this _might_ even work… but you’d better bite the bullet. (BTW, I have no current plans on autoconf’ing non-jumbo versions of JtR.)

    Due to autoconf, things such as OpenMP and OpenCL are now enabled automatically (if system support for them is detected during build). When this is undesirable, you may use e.g. “./configure –disable-openmp” or “./configure –disable-openmp-for-fast-formats” and run with –fork to achieve a higher cumulative c/s rate across the fork’ed processes.

    Out of over 4800 commits since 1.7.9-jumbo-7, over 2600 are by magnum, making him the top contributor. Other prolific contributors are JimF, Dhiru Kholia, Claudio Andre, Frank Dittrich, Sayantan Datta.

    There are also multiple commits by (or attributed to) Lukas Odzioba, ShaneQful, Alexander Cherepanov, rofl0r, bwall, Narendra Kangralkar, Tavis Ormandy, Spiros Fraganastasis, Harrison Neal, Vlatko Kosturjak, Aleksey Cherepanov, Jeremi Gosney, junmuz, Thiebaud Weksteen, Sanju Kholia, Michael Samuel, Deepika Dutta, Costin Enache, Nicolas Collignon, Michael Ledford. There are single commits by (or attributed to) many other contributors as well (including even one by atom of hashcat).


    [PACK] Password Analysis & Cracking Kit



    PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics. The toolkit generates valid input files for Hashcat family of password crackers.

    NOTE: The toolkit itself is not able to crack passwords, but instead designed to make operation of password crackers more efficient.

    [Twitter Password Dump] Command-line Tool to Recover Twitter Password from Web Browsers


    Twitter Password Dump is the command-line tool to instantly recover your lost Twitter password from all the popular web browsers.


    Currently it can recover your Twitter password from following applications,

    • Firefox
    • Internet Explorer (v6.x - v10.x)
    • Google Chrome
    • Chrome Canary/SXS
    • CoolNovo Browser
    • Opera Browser
    • Apple Safari
    • Flock Browser
    • SeaMonkey Browser
    • Comodo Dragon Browser

    It automatically discovers installed applications on your system and recovers all the stored Twitter login passwords within seconds.

    [JBrute v0.9.4] Open Source Security tool to audit hashed passwords


    JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios.


    Java Runtime version 1.7 or higher is required for running JBrute.



    Features


    • Muli-platform support (by Java VM)
    • Several hashing algorithms supported
    • Flexible chained hashes decryption (like MD5(SHA1(MD5())))
    • Both brute force and dictionary decryption methods supported
    • Build-In rule pre-processor for dictionary decryption
    • Multi-threading support for brute force decryption
    Supported algorithms:
    • MD5
    • MD4
    • SHA-256
    • SHA-512
    • MD5CRYPT
    • SHA1
    • ORACLE-10G
    • ORACLE-11G
    • NTLM
    • LM
    • MSSQL-2000
    • MSSQL-2005
    • MSSQL-2012
    • MYSQL-322
    • MYSQL-411
    • POSTGRESQL
    • SYBASE-ASE1502


    [SuperPutty Password Decryptor] SuperPutty Session Login Password Recovery Software


    SuperPutty Password Decryptor is the Free desktop tool to instantly recover all the login passswords from SuperPutty session history.

    SuperPutty is a Windows GUI Application that allows PuTTY SSH Client to be opened in Tabs. It also stores the session details allowing users to automatically login without entering the password every time.

    SuperPutty Password Decryptor helps you to quickly recover all the stored login passwords from this session file. It also automatically detects SuperPutty session file for the current user and displays it. Alternatively, you can also select another session file copied from remote system.


    After the successful recovery, you can generate detailed password report in HTML/XML/TEXT file. It is very simple and easy to use tool with its cool GUI interface.

    [Facebook Password Dump] Tool to instantly recover your lost Facebook password


    Facebook Password Dump is the command-line tool to instantly recover your lost Facebook password from popular web browsers and messengers.


    It automatically discovers installed applications on your system and recovers all the stored Facebook login passwords within seconds.

    Being command-line tool makes it ideal tool for penetration testers and forensic investigators. For GUI version check out the Facebook Password Decryptor.

    [Browser Password Dump] Tool to instantly recover your lost password from all the popular web browsers


    Browser Password Dump is the free command-line tool to instantly recover your lost password from all the popular web browsers.

    Currently it can recover stored web login passwords from following browsers.

    • Firefox
    • Internet Explorer
    • Google Chrome
    • Chrome Canary/SXS
    • CoolNovo Browser
    • Opera Browser
    • Apple Safari
    • Flock Browser
    • SeaMonkey Browser
    • Comodo Dragon Browser

    It automatically discovers installed applications on your system and recovers all the stored web login passwords within seconds.

    [Browser Password Decryptor v5.0] Browser Password Recovery Tool


    Browser Password Decryptor is the FREE software to instantly recover website login passwords stored by popular web browsers.

    Currently it can recover saved login passwords from following browsers.
    • Firefox
    • Internet Explorer
    • Google Chrome
    • Google Chrome Canary/SXS
    • CoolNovo Browser
    • Opera Browser
    • Apple Safari
    • Comodo Dragon Browser
    • SeaMonkey Browser
    • Flock Browser


    It has both GUI interface as well as command line version making it more useful for Penetration testers and Forensic investigators.

    [Twitter Password Decryptor v4.0] Recover Twitter Password


    Twitter Password Decryptor is the FREE software to instantly recover Twitter account passwords stored by popular web browsers.

    Most web browsers store the login passwords for visited websites so that user don't have to remember and enter the password every time. Each of these web browsers use their own proprietary encryption mechanism to store the login passwords including Twitter account passwords.

    TwitterPasswordDecryptor automatically crawls through each of these browsers and instantly recovers all of the stored Twitter passwords.
    It supports both GUI interface as well as command line version making it very useful tool for Penetration testers & Forensic investigators.

    It currently supports recovering of the stored Twitter account password from following popular Internet browsers.
    • Internet Explorer
    • Firefox
    • Google Chrome
    • Chrome SXS/Canary
    • CoolNovo Browser
    • Opera Browser
    • Apple Safari
    • Flock Browser
    • Comodo Dragon Browser
    • SeaMonkey Browser
    Here are the main features
    • Instantly decrypt and recover stored encrypted Twitter account password from Popular Web browsers.
    • Comes with both GUI interface as well as Command-line version.
    • Automatically discovers the supported applications from their respective install location and recovers the password instantly.
    • Sort feature to arrange the displayed password list by username and password which makes it easy to search through 100's of entries.
    • Save the recovered Twitter password list to HTML/XML/Text file
    • Easier and faster to use with its enhanced user friendly interface.
    • It comes with Installer for helping you in local Installation & Uninstallation.     




    [Gmail Password Dump] Command-line Tool to Recover Google Password


    Gmail Password Dump is the command-line tool to instantly recover your lost gmail password from various Google applications as well as popular web browsers and messengers.

    Currently it can recover your Gmail password from following applications,


    • Google Talk
    • Google Picassa
    • Google Desktop Seach
    • Gmail Notifier
    • Firefox
    • Internet Explorer
    • Google Chrome
    • Chrome Canary/SXS
    • CoolNovo Browser
    • Opera Browser
    • Apple Safari
    • Flock Browser
    • SeaMonkey Browser
    • Comodo Dragon Browser
    • Paltalk Messenger
    • Pidgin Messenger
    • Miranda Messenger

    It automatically discovers installed applications on your system and recovers all the stored google account passwords within seconds.

    Being command-line tool makes it ideal tool for penetration testers and forensic investigators. For GUI version check out the Google Password Decryptor.

    [Facebook Password Decryptor v5.0] Facebook Password Recovery Software



    Facebook Password Decryptor is the FREE software to instantly recover Facebook account passwords stored by popular Web Browsers and Messengers.

    It is one of our most popular software with over One Million downloads worldwide.

    It supports recovering of the stored Facebook login password from most of the popular Internet browsers and messengers.


    Here is the complete list of supported applications.


    • Internet Explorer (v4.0 - v10.0)
    • Firefox
    • Google Chrome
    • Chrome Canary/SXS
    • CoolNovo Browser
    • Opera Browser
    • Apple Safari
    • Flock Browser
    • Comodo Dragon Browser
    • SeaMonkey Browser
    • Paltalk Messenger
    • Miranda Messenger
    It presents both GUI interface as well as command line version making it useful tool for Penetration testers and Forensic investigators.

    [Salted Hash Kracker v1.5] Recover the Password from Salted Hash text


    Salted Hash Kracker is the free all-in-one tool to recover the Password from Salted Hash text.


    These days most websites and applications use salt based hash generation to prevent it from being cracked easily using precomputed hash tables such as Rainbow Crack. In such cases, 'Salted Hash Kracker' will help you to recover the lost password from salted hash text.

    It also allow you to specify the salt position either in the beginning of password(salt+password) or at the end of the password (password+salt). In case you want to perform normal hash cracking without the salt then just leave the 'Salt field' blank.

    Currently it supports password recovery from following popular Hash types
    • MD5
    • SHA1
    • SHA256
    • SHA384
    • SHA512

    It uses dictionary based cracking method which makes the cracking operation simple and easier. You can find good collection of password dictionaries (also called wordlist) here & here

    [John the Ripper v1.8.0] Fast Password Cracker


    John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.

    John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance.

    Changelog v1.8.0

    • Revised the incremental mode to let the current character counts grow for each character position independently, with the aim to improve efficiency in terms of successful guesses per candidate passwords tested.
    • Revised the pre-defined incremental modes, as well as external mode filters that are used to generate .chr files.
    • Added makechr, a script to (re-)generate .chr files.
    • Enhanced the status reporting to include four distinct speed metrics (g/s, p/s, c/s, and C/s).
    • Added the “–fork=N” and “–node=MIN[-MAX]/TOTAL” options for trivial parallel and distributed processing.
    • In the external mode compiler, treat character literals as unsigned.
    • Renamed many of the formats.
    • Updated the documentation.
    • Relaxed the license for many source files to cut-down BSD.
    • Relaxed the license for John the Ripper as a whole from GPLv2 (exact version) to GPLv2 or newer with optional OpenSSL and unRAR exceptions.
    • Assorted other changes have been made.

    [Hashcat v0.45] Advanced Password Recovery

    * changes v0.44 -> v0.45:

    Release with some new algorithms:
    • AIX smd5
    • AIX ssha1, ssha256, ssha512
    • GOST R 34.11-94
    We managed also to fix some bugs and implement some additional feature requests

    Full changelog:

    type: feature
    file: hashcat-cli
    desc: show status screen also when all hashes were recovered AND add start/stop time too

    type: feature
    file: hashcat-cli
    desc: added -m 6300 = AIX {smd5}
    cred: philsmd

    type: feature
    file: hashcat-cli
    desc: added -m 6400 = AIX {ssha256}
    cred: philsmd

    type: feature
    file: hashcat-cli
    desc: added -m 6500 = AIX {ssha512}
    cred: philsmd

    type: feature
    file: hashcat-cli
    desc: added -m 6700 = AIX {ssha1}
    cred: philsmd

    type: feature
    file: hashcat-cli
    desc: added -m 6900 = GOST R 34.11-94
    cred: Xanadrel

    type: feature
    file: hashcat-cli
    desc: dropped predefined charsets ?h, ?F, ?G and ?R
    trac: #55

    type: feature
    file: hashcat-cli
    desc: added a collection of language-specific charset-files for use with masks
    trac: #55

    type: feature
    file: hashcat-cli
    desc: changed the E rule to lowercase all input before processing, its more intuitive
    trac: #110

    type: feature
    file: rules
    desc: added a more more complex leetspeak rules file from unix-ninja
    trac: #112

    type: feature
    file: hashcat-cli
    desc: changed outfile opts to line up with OCL style
    trac: #120

    type: feature
    file: hashcat-cli
    desc: --remove in combination w/ external salts should output plain hash files only (no salt)
    trac: #153

    type: bug
    file: hashcat-cli
    desc: fix progress line in status screen when all hashes were recovered

    type: bug
    file: hashcat-cli
    desc: fix for some possible memory overflow problems

    type: bug
    file: hashcat-cli
    desc: an external salt sort failure caused some hashes not to be checked against the digests
    trac: #74

    type: bug
    file: hashcat-cli
    desc: fixed a null-pointer dereference that can lead to a segmentation fault
    trac: #104

    type: bug
    file: hashcat-cli
    desc: fixed a bug if hashlist contains words with ascii character code >= 0x80
    trac: #108

    [Cain & Abel v4.9.44] Password recovery tool for Microsoft Operating Systems

    Cain & Abel is a password recovery tool for Microsoft Operating Systems.

    It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

    The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

    It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.

    The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks.

    The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms.

    The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

    03/05/2013
    Cain & Abel v4.9.44 released
    • Added Windows 8 support in LSA Secret Dumper.
    • Added Windows 8 support in Credential Manager Password Decoder.
    • Added Windows 8 support in EditBox Revealer.
    • Added ability to keep original extensions in fake certificates.
    • Winpcap library upgrade to version 4.1.3 (Windows8 supported).
    • OUI List updated.

    [BSNL Password Decryptor] Tool to Recover the Login Password of BSNL modem/router


    BSNL Password Decryptor is a free desktop tool to instantly recover the Login Password of BSNL modem/router.

    If you have lost login authentication password of your BSNL modem and you have backup configuration file then you can use this tool to quickly recover your password.

    It supports dual mode of password recovery. You can either enter the encrypted BSNL password directly or specify the BSNL Modem's backup configuration file. In second case, it will automatically detect the login password from config file and decrypt it instantly.


    Note that it currently supports limited number of BSNL modems (mainly UT-300 Series). Hence it may or may not work with other models.

    This can be very handy tool for all Network Administrators as well as penetration testers.
    It is successfully tested on both 32 bit & 64 bit windows systems starting from Windows XP to Windows 8

    [DynDNS Password Decryptor] Free Desktop Tool to Recover DynDNS Password


    DynDNS Password Decryptor is a free desktop tool to instantly decode and recover DynDNS password.

    DynDNS - a popuar Dynamic DNS management solution offering enterprise-level DNS performance and reliability. This tool automatically detects locally installed 'DynDNS Updater Client' and displays the configuration file ('config.dyndns')

    It supports dual mode of password recovery. You can either enter the encrypted DynDNS password directly or specify the DynDNS configuration file. In second case, it will find the username/password from the config file and decrypt it instantly.
    You can also use it to recover the password from DynDNS config file of another system. In such case, you can either enter the encrypted password or the config file path manually.

    It has been successfully tested with latest version (v4.1.10) of 'DynDNS Updater Client'.
    DynDNS Password Decryptor is fully portable and works on all windows systems starting from Windows XP to Windows 8.

    Screenshot 1: DynDNS Password Decryptor is showing the decrypted DynDNS Password

    Screenshot 2: Showing Username & Password recovered from the DynDNS configuration file.

    Download DynDNS Password Decryptor
    License : Freeware
    Platform : Windows XP, 2003, Vista, Windows 7, Windows 8