Showing posts with label password cracking. Show all posts
Showing posts with label password cracking. Show all posts

Sunday, November 30, 2014

Cracking FTP with hydra

           Hydra is a fast login cracker that supports a lot of protocols. It is a command line tool, but a GUI is available. The FTP (File Transfer protocol) is used to remotely access files either on a home server or a web server hosted on a web hosting provider. The cracking speed is low but with a weak password and a good wordlist it is possible to be cracked. Most attackers will try to crack a password only if there is no other way in(e.g using an exploit or social engineering).


Monday, August 25, 2014

Cracking truecrypt containers with truecrack


             Truecrack is a software designed to crack truecrypt containers using brute force attack or wordlist attack. It can be useful if you have created a truecrypt container and forgotten the password. The cracking speed depends on the computers CPU.

For more info and a tutorial click the following link.

Tuesday, August 19, 2014

Cracking archives with rarcrack


           Rarcrack is a handy encrypted archive cracker. It can be very useful if you forget a password to encrypted archive. It supports zip, 7z and rar. But on the downside it is slow, the speed depends on the computers processor.
For more info and a tutorial click the following link.

Monday, August 18, 2014

Crunch wordlist generator


        Crunch is a known and very capable wordlist generator. It works by using a predefined charset or a user defined one to generate all possible combinations and write them to file line by line. Wordlists are used in password attacks.
For more info and a tutorial click the following link.

MDCrack how to crack hashes (MD4/MD5/NTLM1)

       MDCrack is a powerful and fast hash cracker. It can brute force MD5, MD4 and NTLM1 hashes. MDCrack is terminal tool but there is a GUI available. It is available for Windows and for Linux. For a quick tutorial , download links and more info click the following link.