background preloader


Facebook Twitter

Strong Password Generator. Make your PIN code more secure using three unique numbers – Cell Phones & Mobile Device Technology News & Updates. With half of the adults in America now owning some sort of smartphone that has access to personal information, hackers are using some simple methods to discover the PIN numbers used to unlock devices.

Instead of using high-tech equipment to run an attack, they are simply looking to see where the fingerprint smudges are in relation to the phone’s keypad, then entering the different permutations of the four numbers until they hit on the right one. However, by using an equally as simple method suggested by security expert, Karl Sigler, you can make it harder for someone trying to steal your information from a misplaced or stolen device.

In a classic example of the phrase “less is more”, by using only three unique numbers in your PIN you actually make it more secure than by using four. Here’s why… Most PIN numbers use a four digits. Pictured above is an iPhone that has a PIN using Sigler’s suggested method (you can tell by the smudges). Read more at Sigler’s site, Skeleton Key Security. Password Strength Checker. Default Password List - Submit. Cisco vpnclient password decoder. Return to vpnc cisco vpnclient password decoder Please do not abuse this service.

cisco vpnclient password decoder

Default Passwords. How I’d Hack Your Weak Passwords. New Tool Reveals Internet Passwords. Password cracking tool instantly reveals cached passwords stored in popular applications Subscribe to SecurityWeek by RSS A Russian software company today released a password cracking tool that instantly reveals cached passwords to Web sites in Microsoft Internet Explorer, mailbox and identity passwords in all versions of Microsoft Outlook Express, Outlook, Windows Mail and Windows Live Mail.

New Tool Reveals Internet Passwords

Moscow based ElcomSoft, developer of the new password recovery tool, “Elcomsoft Internet Password Breaker,” says the product designed as tool to provide forensics, criminal investigators, security officers and government authorities with the ability to retrieve a variety of passwords stored on a PC. With a price tag of just $49, it doesn’t seem as though investigators and government authorities are the real target market. These types of programs are by no means new, but this latest commercial software offering shows just how easily it is to gain access to such tools, even for non-technical users. digg. L0phtCrack Password Auditor. - File Password Search. Default Admin Username and Password list.

How to Crack the Account Password on Any Operating System – Joe Tech. This guest post was written by Blair Mathis from – your premier source for the latest laptop software news and best laptop accessories.

How to Crack the Account Password on Any Operating System – Joe Tech

Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.

Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). The computer will restart and Ophcrack will be loaded. Fsck -fy mount -uw / dscl . That’s it. Password Strength Checker. Create a password protected folder without any special software « Digital Quest. Default Password List - Submit. Default Password List. Password Cracking Wordlists and Tools for Brute Forcing. I quite often get people asking me where to get Wordlists, after all brute forcing and password cracking often relies on the quality of your word list.

Do note there are also various tools to generate wordlists for brute forcing based on information gathered such as documents and web pages (such as Wyd – password profiling tool ) These are useful resources that can add unique words that you might not have if your generic lists. Also add all the company related words you can and if possible use industry specific word lists (chemical names for a lab, medical terms for a hospital etc).

And always brute force in the native language. You can find a simple wordlist generator in PERL here . Although old, one of the most complete wordlist sets is here (easily downloadable by FTP too): Oxford Uni Wordlists There’s a good set of lists here including many european languages and topic specific lists: The Argon Wordlists Totse Word Lists. High speed password cracking with John the Ripper. John the Ripper has been out there for a long time, it’s a great tool for auditing passwords.

High speed password cracking with John the Ripper

How does it work, well simple: you take a password file with encrypted (or better hashed) passwords in it and give it to John. The program will first determine what kind of hash algorithm is used and will then start by taking normal words from an extensive wordlist and feed them one by one through the same hash algorithm.

If the outcome matches with what is in the file that word is obviously the password. After John has exhausted the wordlist it will try variations on the words. It will start every word with a capital and do the whole list again, than it could try every word backwards, substitute all letter “o” with zero’s, “i” with ones, “s” with “$”, and so on.