Skip to content
- Rainbow crack
- ophcrack
- rainbow tables
- rcrack c:\rainbowcrack\*.rt -f pwfile.txt
- Ophcrack
- Cain & Abel
- John the Ripper
- ./unshadow passwd shadow > file_to_crack
- ./john -single file_to_crack
- ./john -w=location_of_dictionary_file -rules file_to_crack
- ./john -show file_to_crack
- ./john –incremental:All file_to_crack
- fgdump
- fgdump [-t][-c][-w][-s][-r][-v][-k][-l logfile][-T threads] {{-h Host | -f filename} -u Username -p Password | -H filename} i.e. fgdump.exe -u hacker -p hard_password -c -f target.txt
- pwdump6
- pwdump [-h][-o][-u][-p] machineName
- medusa
- LCP
- L0phtcrack (Note: – This tool was aquired by Symantec from @Stake and it is there policy not to ship outside the USA and Canada
- Domain credentials
- Sniffing
- pwdump import
- sam import
- aiocracker
- aiocracker.py [md5, sha1, sha256, sha384, sha512] hash dictionary_list
© Chi Tran | Security Research