background preloader

Outils

Facebook Twitter

John the Ripper password cracker MD5. John the Ripper is free and Open Source software, distributed primarily in source code form.

John the Ripper password cracker MD5

If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features.

Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL. There are unofficial binary builds (by John the Ripper user community members) for Windows, Linux, Solaris, and Mac OS X. Cain & Abel password recovery. Cain & Abel is a password recovery tool for Microsoft Operating Systems.

Cain & Abel password recovery

It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks.

Crack Hashes with Rainbow Tables. L0phtCrack Password Auditor. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

How to become a real computer Geek? You may get the answer here: 14 ARP monitoring tools. Some say ARP is an old school crap that it’s no longer useful in this modern day and age.

14 ARP monitoring tools

Those who say this, don’t know what it’s all about. ARP is used to link IP address to a system’s physical MAC address in a local network, this is how the servers identify each other. [ad] By understanding ARP and knowing how to use the arp utility, one can troubleshoot network related issues faster. In this article, we’ve put together 14 tools specifically used to to deal with ARP related monitoring and troubleshooting. 1) Arping - an ARP level ping utility. Download from here 2) arp-scan - sends ARP (Address Resolution Protocol) queries to the specified targets, and displays any responses that are received.

Download from here 3) arpalert - uses ARP address monitoring to help prevent unauthorized connections on the local network. Download from here. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking

However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time.

Intitle:”Live View / – AXIS” 2. 3. Free Portable Software USB Flash Drive Applications.