Header Ads

Top 10 Password Hacking tools(Password Crackers)

Before providing you the tools that are used by most crackers I would like to clarify the term crackers.

Crackers are persons who manage to crack the passwords to get into a machine,server,email account or it can be anything.They crack the password (don't term crackers as hackers.
Hackers are ghost they always mange to get into a servers,website or anything else without cracking the passwords because cracking password is not a reliable method as every password cannot be cracked.)
Today there are many password cracking tools available on net but most are fake and bullshit but some are very useful and are used by crackers.Below is a crafted list of useful ones.(Password Crackers)


Note:Most of the tools provided below are free but one or two are commercial.
You should first use some of the free tools mentioned in the list to get an idea of how to use them and then you should consider buying commercial tools.


List starts here.........

1:-

Cain and Abel : This is at the top of Crackers choice since it's first release.The top password recovery tool for Windows.
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It offers a GUI interface.It is only available for Windows.
OS supported:Only Windows


2 John the Ripper : A powerful, flexible, and multi-platform password hash cracker
John the Ripper is a fast password cracker,currently available for many flavors of Unix , DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here or you can Google for a worlist.It does not offer a GUI interface.It's source code is available for free(good news for developers)



3


THC Hydra : A Fast network authentication cracker which supports many different services.
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the peoples at THC.Plus point is that beside offering a GUI interface it also features a command line interface.


4

Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).   


5 L0phtcrack : Windows password auditing and recovery application
L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009.    


6

Airsnort : 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group  and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 


7


SolarWinds : A plethora of network discovery/monitoring/attack tools
SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more.


8Pwdump : A window password recovery tool
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.


9


RainbowCrack : An Innovative Password Hash Cracker
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.


10

Brutus : A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available.
So these are the tools that are used by crackers to crack the password.
Enjoy
By Darksidehackers.blogspot.com

Keep Practicing Hacking

1 comment:

Iam seriously addicted to your comments...

Powered by Blogger.