The top 10 brkers/s for /LinuxThis post helps you to unlock rar,iso files for free.....
The best s. The list made from all brkers from all over the globe including versions from unix and widnows as well.
1. Cain and Abel :The top recovery tool for
UNIX users often smugly assert that the best free security tools support their platform first, and ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This -only recovery tool handles an enormous variety of tasks. It can recover s by sniffing the network, encrypted s using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled s, revling boxes, uncovering cached s and analyzing routing protocols.
2. John the Ripper :A powerful, flexible, and fast multi-platform hash
John the Ripper is a fast , currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect wk Unix s. It supports several crypt(3) hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and NT/2000/XP LM hashes
3. THC Hydra :A Fast network authentiion which support many different services
When you need to brute force a remote authentiion service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more
4. Air :The fastest available WEP/WPA tool
Air is a suite of tools for 802.11a/b/g WEP and WPA . It can recover a 40 through 512-bit WEP once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), air (static WEP and WPA-PSK ), and airdecap (decrypts WEP/WPA capture files)
5. L0pht : auditing and recovery appliion
L0pht, also known as LC5, attempts to s from hashes which it can obtain (given proper access) from stand-alone NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of erating guesses (dictionary, brute force, etc). LC5 was discontinued by in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and won't sell you a , so you'll either have to cse using it or find a . Since it is no longer maintained, you are probably better off trying Cain and Abel, John the Ripper, or Oph instd.
6. Airsnort :802.11 WEP Encryption Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption . It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption when enough packets have been gathered. You may also be interested in the similar Air.
7. SolarWinds :A plethora of network discovery/monitoring/attack tools
SolarWinds has crted and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force , router decryption, a TCP connection reset program, one of the fastest and siest router config download/upload appliions available and more.
8. Pwdump :A window recovery tool
Pwdump is able to extract NTLM and LanMan hashes from a target, regardless of whether Sys is enabled. It is also capable of displaying histories if they are available. It outputs the data in L0pht-compatible form, and can write to an output file.
9. Rainbow :An Innovative Hash
The Rainbow tool is a hash that makes use of a large-scale time-memory trade-off. A traditional brute force tries all possible plaintexts one by one, which can be time consuming for complex s. Rainbow uses a time-memory trade-off to do all the -time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but Rainbow can be hundreds of times faster than a brute force once the precomputation is finished.
10. Brutus :A network brute-force authentiion
This -only bangs against network services of remote systems trying to guess s by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source is available. UNIX users should take a look at THC Hydra.-->
No comments:
Post a Comment