www.Hacking-Romania.com
Hacking, gaby hacker team, programe hack, radmin hack, hi5 hack, hack the west, hacking romania, hacking stuff, hacking tools, 1 hack, 1st hacks, 2 hack, 2 hacks, 3 hack, 3 hacks, 3000 hack, 3004 hack, 4 hack, 4 hacks, 55 hack, 6 hack, 6 hacks, 7 hack, 7 hacks, 9 hack, 9dragons hack, a hack, adventure quest hack, aim hack, alz hack, and hacks, best hack, blue hack, bots hack, bots hacks, buy hack, cabal online hack, chaos hacks, cheat engine hack, cheat hack, cheats and hacks, cheats hacks, city hack, club hack, combo hack, conquer hacks, conquer online hack, conquer online hacks, conquer speed hack, conquiztador hack, counter strike 1.6 hack, damage hack, de hack, download hack, download hack for, dragonfable hack, dragonfable hacks, drakkarious hack, exp hack, flyff hack, free hack, free hacks, game hack, game hacks, garena exp hack, gladiatus hack, gm hack, gold hack, gunz hack, hack, hack 5, hack a pc, hack a site, hack a website, hack blog, hack conquer, hack counter strike, hack crack, hack cs, hack cs 1.6, hack dvd, hack email, hack forum, hack hunter, hack id, hack info, hack it, hack mess, hack muonline, hack net, hack password, hack passwords, hack pc, hack pdf, hack programs, hack site, hack sites, hack soft, hack software, hack team, hack the game, hack this, hack website, hack windows xp, hack world, hack xp, hacked, hacking, hacking game, hacking programs, hacking software, hacking tutorials, hacks, how hack, how to hack, icon hack, last chaos hack, last chaos hacks, life hack, lineage 2 hack, lineage 2 hacks, linux hack, lvl hack, maplestory hacks, mobile hack, multi hack 3.0, mybrute hack, naruto arena hack, naruto arena hacks, one hit kill hack, online hacks, perfect world hacks, pool hack, programe hack, resolution hack, resource hack, roll hack, royal hack, silkroad hack, source hack, speed hack, speed hacks, super hack, the west hack, warrock hack, warrock hacks, web hack, xpango hack, lockerz forum
Lista Forumurilor Pe Tematici
www.Hacking-Romania.com | Reguli | Inregistrare | Login

POZE WWW.HACKING-ROMANIA.COM

Nu sunteti logat.
Nou pe simpatie:
amandax pe Simpatie.ro
Femeie
23 ani
Iasi
cauta Barbat
32 - 47 ani
www.Hacking-Romania.com / Hacking T00ls / PasswordPro v2.3.1.0  
Autor
Mesaj Pagini: 1
948Y-H4(K3R
☻ADM!N☻

Inregistrat: acum 17 ani
Postari: 2716
The program is designated to recover passwords for following types of hashes:
* MySQL
* MySQL5
* DES (Unix)
* MD4
* MD4 (Base64)
* MD4 (HMAC)
* MD5
* MD5 (Base64)
* MD5 (HMAC)
* MD5 (Unix)
* MD5 (APR)
* SHA-1
* SHA-1 (Base64)
* SHA-1 (HMAC)
* Domain Cached Credentials

As well as for hashes used by various PHP-programs:
* md5(md5($pass))
* md5(md5($pass).$salt)
* md5(md5($salt).md5($pass))
* sha1($username.$pass

The program includes the following tools:
* Hash generator - designated to generate any hash of types, supported by the program.
* Password generator - designated to generate random passwords with parameters specified.
* Text convertor - allows to convert text from Base64 format to plain text and vice versa.
* Hidden passwords recovery - designated to recover text hidden by asterisks.
* System information - displays various system information.

Program features
* Passwords recovery using following methods:
- Preliminary attack;
- Brute-force attack (including distributed attack);
- Mask attack;
- Simple dictionary attack;
- Combined dictionary attack;
- Hybrid dictionary attack;
- Pre-calculated Rainbow-tables attack;
* Recovery of passwords up to 128 symbol length;
* Recovery of passwords for incomplete hashes of any type;
* User's hashes editor;
* Search of data in the list of imported users;
* Quick add of the hash using dialog box;
* Quick check of the current password for all imported users;
* Use of symbol replace tables for the simple dictionary attack;
* Unlimited number of dictionaries used for dictionary attack;
* Unlimited number of tables used for pre-calculated Rainbow-tables attack;
* Unlimited number of users with hashes (in the licensed version);

Types of attack
Preliminary attack:
This type of attack is quick check of users' hashes to match simple passwords like - "123", "qwerty", "99999", etc. as well as for earlier found passwords stored by the program in the "PasswordsPro.dic" file.
Brute-force attack:
This type of attack is total check of all password variants.
Brute-force attack also includes distributed attack. This type of attack allows using several computers for passwords recovery distributing passwords to process. This type of attack is enabled automatically when the user sets more than one computer to participate in attack. Then ability to set password range to recover for current computer. So to start distributed attack you shall:
Run program on several computers.
Choose required number of computers for attack.
Set the same attack settings for all the computers.
Choose for every computer own password range to recover.
Run brute-force attack on every computer.
Mask attack:
This type of attack is used if any information about the password is provided, i.e. if anything is known about the password. For example:
- Passwords begin with "12345" symbol combination;
- First 4 symbols of the password are numbers, others are Latin letters;
- etc.
For that define mask for every symbol of the password to recover in the mask attack settings. Keys of standard or user symbol sets are used as mask symbols - ?u, ?d, ?2, etc.
Simple dictionary attack:
This type of attack is check of hashes for match from text files - dictionaries. Attack settings also allow to use symbol replace tables what lets to substitute one symbol in the password to another.
Combined dictionary attack:
This type of attack includes check of the passwords made of several words taken from different dictionaries. This attack allows to recover complex passwords like "superadmin", "admin1980", "admin*admin", etc.
Hybrid dictionary attack:
This type of attack allows to change passwords from the dictionaries (for example, shift password to upper case, add symbol "1" to the end of the password, etc.) and to check them as users passwords. Actions performed at source passwords are so called "rules" - full list of these rules can be found in "Rules.txt" file in the program archive.
Pre-calculated tables attack:
This type of attack uses Rainbow-technology

Download:


pus acum 15 ani
   
Pagini: 1  

Mergi la