Skip to content

A Survival Knife (Fantastic) Force Attacks, Incorporating Teeth Cybertooth && John the Ripper, most Advanced Password and Logon Cracker.

License

GPL-3.0 and 2 other licenses found

Licenses found

GPL-3.0
LICENSE.md
Apache-2.0
LICENSE.txt
Unknown
LICENSE-MAIN.txt
Notifications You must be signed in to change notification settings

byt3n33dl3/PasswordCracker

PasswordCracker

Circle CI Downloads License GitHub Activity Documentation

PasswordCracker is designed to be both feature rich and fast. It combines several cracking modes in one program and is fully configurable for your particular needs. You can even define a custom cracking mode using the built in compiler supporting a subset of C. Also, John is available for several different platforms which enables you to use the same cracker everywhere, you can even continue a cracking session which you started on another platform.

  • John the Ripper

Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource. It can also be used to help a threat actor obtain unauthorized access to resources.

  • Teeth Cybertooth

With the information malicious actors gain using password cracking, they can undertake a range of criminal activities. Those include stealing banking credentials or using the information for identity theft and fraud.

A password cracker recovers passwords using various techniques. The process can involve comparing a list of words to guess passwords or the use of an algorithm to repeatedly guess the password.

Cracking

For recovering lost passwords, If you've forgotten your password, you can use a password cracker to help you regain access. Testing password strength Security professionals use password crackers to test the strength of their own passwords.

Verifying password policy compliance Password crackers can be used to ensure that an organization's password policy is being followed. For example, if the organization has a password expiration policy, password crackers can be run at intervals that coincide with the intended password lifetime.

Copyright

(c) 1996-2024 by @Openwall and @byt3n33dl3

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation: either version 2 of the License, or (at your option) any later version.

v13.2.0 / master

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY: without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

As a special exception to the GNU General Public License terms, permission is hereby granted to link the code of this program, with or without modification, with any version of the OpenSSL library and/or any version of unRAR, and to distribute such linked combinations. You must obey the GNU GPL in all respects for all of the code used other than OpenSSL and unRAR. If you modify this program, you may extend this exception to your version of the program, but you are not obligated to do so. In other words, you may release your derived work under pure GNU GPL version 2 or later as published by the FSF.

   ___                                 _______             __          
  / _ \___ ____ ____    _____  _______/ / ___/______ _____/ /_____ ____
 / ___/ _ `(_-<(_-< |/|/ / _ \/ __/ _  / /__/ __/ _ `/ __/  '_/ -_) __/
/_/   \_,_/___/___/__,__/\___/_/  \_,_/\___/_/  \_,_/\__/_/\_\\__/_/  v3.0 
                                                                       

Introduction

by: (@byt3n33dl3) Sulaiman A [email protected]

A Survival Knife Fantastic Force Attacks, Incorporating Teeth Cybertooth && John the Ripper, most Advanced Password and Logon Cracker.

  • PasswordCracker

One of the best security tools which can be used to crack passwords is PasswordCracker.

Originally, “Cracker Jack” was developed for the sake of cracking Unix /etc/passwd files with the help of a dictionary. Then, PasswordCracker came into existence afterward. Moreover, a “Pro” version was developed to include more features than the ordinary version. Especially that it has the capability to include and deal with many more hash types on which encrypted passwords are based in the first place. The Rapper’s commercial version is the most used among penetration testers for cracking passwords. This is essentially because of both its speed and great performance.

  • How does PasswordCracker crack passwords?

This field of science is basically perceived as cryptanalysis. In fact, there exist some vulnerabilities in passwords, which opens the gate for hackers to exploit in order to get the password back from its encrypted format following the use of a hashing method.

One of the most common methods to crack passwords is brute force attacks.It is simply a method which mainly depends on performing a cross-checking against a cryptographic hash which is available for the password.

. It is simply a method which mainly depends on performing a cross-checking against a cryptographic hash which is available for the password. . On the other hand, a password could be recovered through what is called rainbow table. It is much faster and contains password hashes from which a password is guessed by a computer system.

  • Common types of attacks used by PasswordCracker There are essentially two main types of attacks harnessed by PasswordCracker in order for it to crack any password.

    .Dictionary Attacks

    a. String samples are essentially taken from a specific wordlist, text file, a dictionary or past cracked passwords.
    b. They are then encrypted identically to the method, key, and algorithm in which the desired password was encrypted originally.
    c. Dictionary words could also be altered in a randomized manner to check if they work this way
    d. Single attack mode of PasswordCracker can do such alterations. Accordingly, different hashes variations are compared when using different alterations.
    

    .Brute Force Attacks

    a. All possible plaintexts composed of usernames with encrypted passwords are all exhausted to find the right one.
    b. They are all hashed and compared to the originally inputted hash.
    c. Character frequency tables are used by the program for the sake of including the most probable used characters first.
    d. This method is so slow, yet it could identify those passwords having no existence in a dictionary.
    

Info

Works by Recover all the Activity overall

A parallelized Password Cracking which supports numerous History or Value to Attacks. It is very fast and flexible, and new modules are easy to add. Making this tool to be powerful for brute forcing passwords. It can perform fast and parallel dictionary attacks against 'lost' protocols. It is easy to install and use and has many options to help you customize and optimize your attacks.

Please read the Documentation file, as it contains the requirements for building and running the kernel, and information about the problems.

Tests: / master

Travis Coverity GitHub Actions
Hashcat Travis Build status Coverity Scan Build Status Hashcat GitHub Actions Build status

Run: passwordcracker -h for more.
Run: passwordcracker -hh for a lot more.

Notes

Educational purposes only. Some credit to awesome people

  • PasswordCracker : -

A Survival Knife (Fantastic) Force Attacks, Incorporating Teeth Cybertooth && John the Ripper, most Advanced Password and Logon Cracker.

  • Hashcat

Most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS, and has facilities to help enable distributed password cracking.

  • PasswordCracker : Teeth Smilodon

Contributors

About

A Survival Knife (Fantastic) Force Attacks, Incorporating Teeth Cybertooth && John the Ripper, most Advanced Password and Logon Cracker.

Topics

Resources

License

GPL-3.0 and 2 other licenses found

Licenses found

GPL-3.0
LICENSE.md
Apache-2.0
LICENSE.txt
Unknown
LICENSE-MAIN.txt

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •