Title: Password cracking used in Penetration TestingAuthor: ajayverma
Rainbow crack (http://www.antsight.com/zsl/rainbowcrack/)
> ophcrack (http://ophcrack.sourceforge.net/)
> rainbow tables
rcrack c:\rainbowcrack\*.rt -f pwfile.txt

Ophcrack (http://ophcrack.sourceforge.net/)

Cain & Abel (http://www.oxid.it/)

John the Ripper (http://www.openwall.com/john/)
./unshadow passwd shadow > file_to_crack
./john -single file_to_crack
./john -w=location_of_dictionary_file -rules file_to_crack
./john -show file_to_crack
./john --incremental:All file_to_crack

fgdump (http://www.foofus.net/fizzgig/fgdump/)
fgdump [-t][-c][-w][-s][-r][-v][-k][-l logfile][-T threads] {{-h Host | -f filename} -u Username -p Password | -H filename} i.e. fgdump.exe -u hacker -p hard_password -c -f target.txt

pwdump6 (http://www.foofus.net/fizzgig/pwdump/)
pwdump [-h][-o][-u][-p] machineName

medusa (http://www.foofus.net/jmk/medusa/)
LCP (http://www.lcpsoft.com/english/index.htm)
L0phtcrack (Note: - This tool was aquired by Symantec from @Stake and it is there policy not to ship outside the USA and Canada
> Domain credentials
> Sniffing
> pwdump import
> sam import
> aiocracker (http://www.packetstormsecurity.com/filedesc/aiocracker.py.txt.html)
aiocracker.py [md5, sha1, sha256, sha384, sha512] hash dictionary_list


Submitted On: 2019-05-30 12:51:43