This windows application is for people who want to learn the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here.
I do my best to provide step by step instructions along with the reasons for doing it this way. Other times I will point to a particular website where you find the
information.
The SAM is the Security Accounts Manager database where local usernames and passwords are stored. For legal purposes I am using my own system for this experimentation.
The Content of this app includes...
1.LM vs. NTLM
2. Syskey
3. Cracking OS Passwords
4. Extracting the hashes from the OS SAM
5. Using BackTrack Tools
6. Using bkhive and samdump v1.1.1 (BT2 and BT3)
7. Using samdump2 v2.0.1 (BT4)
8. Cached Credentials
9. Using Windows Tools
10. Using fgdump
11. Using gsecdump
12. Using pwdump7
13. Cached Credentials
14. Extracting the hashes from the Windows SAM remotely
15. Using BackTrack Tools
16. ettercap
17. Using Windows Tools
18. Using fgdump
19. Cracking Windows Passwords
20. Using BackTrack Tools
21. John the Ripper BT3 and BT4
22. Cracking the LM hash
23. Cracking the NTLM hash
24. Cracking the NTLM using the cracked LM hash
25. Cracking cached credentials
26. John the Ripper - current
27. Get and Compile
28. Cracking the LM hash
29. Cracking the LM hash using known letter(s) in known location(s) (knownforce)
30. Cracking the NTLM hash
31. Cracking the NTLM hash using the cracked LM hash (dumbforce)
32. Cracking cached credentials
33. Using MDCrack
34. Cracking the LM hash
35. Cracking the NTLM hash
36. Cracking the NTLM hash using the cracked LM hash
37. Using Ophcrack
38. Cracking the LM hash
39. Cracking the NTLM hash
40. Cracking the NTLM hash using the cracked LM hash
41. Using OS Tools
42. John the Ripper
43. Cracking the LM hash
44. Cracking the NTLM hash
45. Cracking the NTLM hash using the cracked LM hash
46. Cracking cached credentials
47. Using MDCrack
48. Cracking the LM hash
49. Cracking the NTLM hash
50. Cracking the NTLM hash using the cracked LM hash
51. Using Ophcrack
52. Cracking the LM hash
53. Cracking the NTLM hash
54. Cracking the NTLM hash using the cracked LM hash
55. Using Cain and Abel
56. Using a Live CD
57. Ophcrack
58. Changing OS Passwords
59. Changing Local User Passwords
60. Using BackTrack Tools
61. chntpw
62. Using a Live CD
63. chntpw
64. System Rescue CD
65. Changing Active Directory Passwords
66. plain-text.info
67. Cracking Novell NetWare Passwords
68. Cracking Linux/Unix Passwords
69. Cracking networking equipment passwords
70. Using BackTrack tools
71. Using Hydra
72. Using Xhydra
73. Using Medusa
74. Using John the Ripper to crack a Cisco hash
75. Using Windows tools
76. Using Brutus
77. Cracking Applications
78. Cracking tar passwords
79. Cracking zip passwords
80. Cracking pdf passwords
81. Wordlists aka Dictionary attack Using John the Ripper to generate a wordlist
82. Configuring John the Ripper to use a wordlist
83. Generating a rainbow table
84. WEP cracking
85. WPA-PSK using airolib & pyrit
86. Distributed Password cracking using john & medussa (not a typo this is not medusa)
Additional contents includes:
1. Penetration Testing with Kali Linux and MetaSploit
2. Professional Penetration Testing
3. Bots, Botnets, DDos Attacks and DDos Attacks Mitigation
4. .HTACCESS SECURITY & ATTACKS