Content

------------ ------------------------------ ------------------------- --------------------------------- ------------------------------ ---------- -------------------
| Home | | Korean Drama | | Window8Trick | | MicrosoftOfficeTrick | | Window7Trick | | IDM | | SoftWare | |
------------ ------------------------------ ------------------------- --------------------------------- ------------------------------ ---------- -------------------

Thursday, February 23, 2012

Recover Window Login Passwords Using Ophcrack LiveCD(XP,Vista,Window 7)

Ophcrack Home
Once you're there, click on the Download ophcrack LiveCD button. On the next page, click on either the XP or Vista link to download the correct ISO image file for your operating system. Choose the Vista version for Windows 7 as well. This file may take some time to download.
An ISO file contains everything that should go on a CD or DVD or USB in a single file. The Ophcrack LiveCD ISO file contains SliTaz (a Linux distribution), the Ophcrack software, and other files needed to recover passwords. Don't worry about the details - the Ophcrack LiveCD is fully automatic - no Linux experience required.


Boot from cd and Wait for Ophcrack LiveCD to Recover Your Password
Ophcrack Software Running
Ophcrack Software Running
The next screen is the Ophcrack LiveCD software itself. Ophcrack will attempt to recover the passwords for all of the user accounts that it can find on your computer. This password cracking process is completely automated.
The important things to look for here are the accounts listed in the User column and the passwords listed in the NT Pwd column. If the user account you're looking for isn't listed, Ophcrack didn't find that user on your computer. If the NT Pwd field is blank for a particular user, the password has not been recovered yet.
As you can see in the example above, the passwords for the Administrator and Guest accounts are listed as empty. If you were cracking a password for a user that Ophcrack shows as empty, you now know that you can log on to the account without a password at all, assuming that the user account is enabled.
Look toward the bottom of the user list - see the Tim user account? In under one minute, Ophcrack recovered the password to this account - applesauce. You can ignore any other accounts you're not interested in recovering the passwords for.
After Ophcrack recovers your password, write it down, remove the Ophcrack LiveCD disc from your optical drive and restart your computer. You don't need to exit the Ophcrack software - it won't harm your computer to power it off or restart it while it's running.
In the next step, you'll finally get to log on to Windows with your discovered password!
Note: If you do not remove the Ophcrack LiveCD disc before you restart, your computer will likely boot from the Ophcrack disc again instead of your hard drive. If that happens, just take the disc out and restart again.

Did Ophcrack Not Find Your Password?

Ophcrack won't find every password - some are too long and some are far too complicated. If Ophcrack didn't do the trick just try another free Windows password recovery tool. Each of these tools work a bit differently so another program might have no problem at all recovering or resetting your Windows password.

 You can try this video to logon without password:

Monday, February 20, 2012

reaver-wps Brute force attack against Wifi Protected Setup

Logo
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.
Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.

Download (mediafire reaver 1.4)  

Tutorial: How to run Reaver inside Beini

The article will focus on the the TCZ package and how to obtain the Reaver in Beini normal operation.

Beini of Zhao Chunsheng a few days ago Reaver submitted to the TCL group , so Reaver Beini run it possible.
The tools need to be prepared:
Beini the ISO
UltraISO (google it)
Reaver the TCZ packages (mediafire reaver 1.4.gz)use link below
mediafire reaver 1.4.tcz 
The recommended low version of this file(sqlite3.tcz) be placed, in order to avoid dependency problems.
Downloaded the TCZ packages, loaded with UltraISO Beini ISO image file:
Here, for example, to Beini1.2.2 TCZ file into the folder named tce
* put both reaver.tcz and sqlite3.tcz into tce folder


Press Ctrl + S to save your changes, and will load the ISO into a virtual machine or burn into the removable media guide into Beini system after opening the shell, you should see the normal load of Reaver:


At this point, the Reaver will be installed on Beini.

Inflator: Reaver Command generator 1.0 release

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases.
Inflator is a Reaver Command generator.

  Inflator ver:1.0
  Date:2012-01-21
  MD5(zip):92a11f4481707e1102dfbd27fe3f6ca6
  Download address:Here
  Tip:The first version, build for Reaver v1.4, it can directly run in BackTrack 5 R1-Gnome-32(64)bit with Reaver-1.4. Only supports the English system.

BackBox Linux

BackBox Linux

BackBox development based on Ubuntu, is a rapid start (including the desktop environment) and easy-to-use network penetration testing and security assessment, software repository update speed quickly, contains many well-known hacking tools.



The following is the operation of the screen Inflator1.0 in BackBox2.01 (i386):


Download BackBox Linux from official Website

**Inflator 1.0 Not build in the OS, you must be install reaver1.4 first.
Relatively simple methods: DEB file copied to the root directory of the ISO, install them after the system boots.
If you have patience: https://help.ubuntu.com/11.04/installation-guide/i386/appendix-preseed.html

Tiny Core Inflator 1.0

TinyCore use Inflator (Amendment 2)

executable file in the inflator1.0-backtrack5r1-gnome-bit32.deb "inflator" can not be normal use the TinyCore-4.2.1 environment (CDlinux is meant to-0.9.7 can be directly used, as long as made the appropriate package that is, may) need some modification, the modified file is available for download.


How to use:
1: Unzip after "inflator1_0.tcz," copied into "TinyCore-4.2.1 CD-ROM root directory;
2: boot the system, open the terminal execution: tce in-the load-i / mnt/sr0/inflator1_0.tcz the
Note: The above command unparalleled quotes, sr0 is my CD-ROM device operator, please press need to be amended. (Amendment 1: This command will automatically display the icon)
Download: Click
MD5 (zip): 3f2d5dff2a77b516244837c636a91a46
Repair a:
Old and new version of the CD-ROM in TinyCore start automatically load the package is different from the old version of TinyCore only need to copy the package to TCE directory to the new version is a little tricky, to "inflator1_0.tcz", for example:
1:
Edited with UltraEdit the ISO tce in \ onboot.lst, add:
inflator1_0.tcz
Note: Please keep a blank line added
2:
To Inflator icon:
ISO "tce in \ mydata.tgz 7z software to open, and then use the UltraEdit edit the following file:
"Mydata.tgz \ mydata.tar \ home \ tc \. Icons"
Add three lines: (Note: Please keep a blank line added)
i: / tmp/tcloop/inflator1_0/usr/local/tce.icons/inflator_icon.png
t: Inflator
c: sudo / bin / inflator / inflator
The the "onboot.lst" and "mydata.tgz default in the new version of the TinyCore CD does not exist, when TinyCore install to your hard drive and generate a user profile to appear.
Repair (Amendment package - call permissions) 2012-01-25 18:15
2012-01-25 11:10 Revised


DEMO VIDEO 

Wednesday, February 15, 2012

Elcomsoft 4.0 for WPA cracking(FIND YOUR OWN DICTIONARY)

Elcomsoft Wireless Security Auditor

Best and Fastest Wi-Fi Security Audit

Examine Wireless Network Security

Elcomsoft Wireless Security Auditor allows network administrators to verify how secure a company’s wireless network is by executing an audit of accessible wireless networks. Featuring patent-pending cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2-PSK text passwords in order to test how secure your wireless environment is.

Designed for nVidia CUDAATI Stream supportEnhanced of Intel Core

Features and Benefits

  • Determine how secure your wireless network is
  • Built-in wireless network sniffer (with AirPCap adapters)
  • Test the strength of WPA/WPA2-PSK passwords protecting your wireless network
  • Save time with patent-pending GPU acceleration technology when one or more compatible NVIDIA or ATI video cards are present
  • Hardware acceleration on Tableau TACC1441 hardware
  • Run advanced dictionary attacks with highly configurable variations
  • Perform attacks from inside or outside of your network

How Secure Is Your Wireless Network?

A single weak link poses a valid security threat to the entire corporate network. Wireless (Wi-Fi) networks can provide sufficient security if configured properly and accompanied by an adequate password policy. Elcomsoft Wireless Security Auditor exposes security problems in your wireless network to allow network administrators taking appropriate measures and adopting a proper password policy.

Wireless Network Security Audit

Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor works completely in off-line, undetectable by the Wi-Fi network being probed, by analyzing a dump of network communications in order to attempt to retrieve the original WPA/WPA2-PSK passwords in plain text.
Elcomsoft Wireless Security Auditor allows carrying out a password audit within a limited timeframe. Representing state-of-the-art in password recovery, Elcomsoft Wireless Security Auditor is one of the fastest and most advanced tools for recovering Wi-Fi passwords. If Elcomsoft Wireless Security Auditor fails to recover a Wi-Fi password within a reasonable time, the entire wireless network can be considered secure.

GPU Acceleration

ElcomSoft has pioneered many software innovations that have made it easier to recover passwords protecting various types of resources. For the first time in the industry, the company’s patent-pending GPU acceleration makes its way into Wi-Fi password recovery, reducing the time required to recover Wi-Fi passwords up to a hundred times. Supporting up to four NVIDIA boards such as GeForce 8, 9, 100, 200 and 400 (Fermi), as well as ATI video cards such as Radeon HD 4800 and 5000 series, Elcomsoft Wireless Security Auditor allows building servers with supercomputer performance at a fraction of the price.
WPA-PSK Password Audit
These benchmarks are missing NVIDIA’s latest boards based on the new Fermi chipset, NVIDIA’s next generation GPU architecture. NVIDIA Tesla S2050/S2070 are claimed to surpass everything announced by NVIDIA’s competitors, but will be available only in late 2010.

Types of Attacks

Elcomsoft Wireless Security Auditor performs an advanced dictionary search attack in order to expose weak passwords consisting of words and phrases in spoken languages. Allowing highly customizable mutations of ordinary dictionary words, Elcomsoft Wireless Security Auditor performs hundreds of mutations to each word in order to ensure the widest coverage.

Compatibility with Other Elcomsoft Products

If one of your network workstations is compromised and a malicious person gets network access to at least one system, it may not even be necessary for an attacker to be physically close to the wireless network in order to obtain full access to data sent and received. A password hash is normally stored in the Windows Registry, and can be retrieved remotely for off-line analysis.
Elcomsoft Wireless Security Auditor can simulate attacks from the inside by automatically importing saved password hashes as retrieved by Elcomsoft Proactive System Password Recovery. This kind of attacks allows determining how secure your wireless network is to insider attacks.

Compatibility Chart

EWSA Standard EWSA Professional
Brute-force attack
Dictionary attack with mutations
Wireless sniffer (for AirPCap adapters)
Number of CPUs supported 2 32
Number of GPUs supported 1 8
Hardware acceleration on Tableau TACC1441

Notes

Wireless sniffer included into Elcomsoft Wireless Security Auditor works with AirPCap adapters only, and requires proper drivers (from CACE Technologies Inc.) installed. If you do not have a compatible adapter, the program requires a valid log of wireless communications in standard tcpdump format. The tcpdump format is supported by all commercial Wi-Fi sniffers. In order to audit your wireless network, at least one handshake packet must be present in the tcpdump file.
If you use EWSA with ATI Radeon cards, you should have the latest ATI Catalyst drivers installed (10.3 or newer).

Download Elcomsoft 1.0with crack mediafire
1.) Unpack and install
2.) Do not enter any serial during installation process 
3.) Copy cracked ewsa.exe over  original (Search for installation folder in C:\Program Files\Elcomsolf\xxxx please search)
4.) Register your copy with any serial longer than 5 chars  (TYPE ANY PASSWORD)
AFTER REGISTER IT WILL CONVERT TO FULL
5.) Enjoy

Download Elcomsoft 4.0with patch mediafire
1.)  install
2.) Do not enter any serial during installation process 
3.) Run patch,(Search for ewsa.exe in installation folder in C:\Program Files\Elcomsolf Password Recovery)

Save .cap from wpa handshake(from beini/backtrack/ubuntu) and upload to EWSA

* have installed the program but not tried yet.My laptop comes with Intel Graphic Media Accelerator. GPU acceleration only support nVidia/ATI (very useful for large size of dictionary ~2-120Gb)


**just shared the link for dictionaries(torrent)
http://thepiratebay.se/torrent/5979896 (71mb)
http://thepiratebay.se/torrent/5945498/WPA-PSK_WORDLIST_3_Final_%2813_GB%29.rar(4.49Gb)