본문 바로가기

crack5

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening – yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of.. 2013. 12. 20.
RainbowCrack Project UPDATE “RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from the hash crackers that use brute force algorithm. RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. It crack hashes with rainbow tables.” Official change log for RainbowCrack 1.5: Support 64-bit Windows operating systems Support 32-bit Linux operating s.. 2012. 1. 13.
SAMInside - password recovery program for cracking SAMInside 2.6.5.0 SAMInside is designated for the recovery of Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7 user passwords. Some of its outstanding features include: • The program has small footprint, it doesn't require the installation and can be run from a diskette, CD/DVD-disk or USB-drive. • Includes over 10 types of data import and 6 types of password attack: .. 2011. 4. 8.
PasswordsPro - 해시(Hash) 암호화 크랙 Important! Using this software for purposes other than recovering your own lost passwords violates License Agreement and may violate the Law! Program Description This program is designated for the recovery of passwords for different types of hashes. The program currently supports about 30 types of hashes, and new ones can be easily added by creating a custom external hashing DLL-module. The actu.. 2010. 1. 15.
리눅스 보안 - 공격, 해킹 관련 보안 도구 및 유틸 서버취약점 점검 툴 Cops (Computerizes Oracle and Password System) : 대표적인 보안점검 도구 스캐너관련 툴 SAINT : 관리자용 네트워크 진단도구 PortSentry : 대표적인 스캐닝방어도구이며 가장 많이사용하는 보안도구 nmap : 서버의 취약점을 점검해주는 보안도구 (해킹시 상대 웹서버 포트 스캔용으로 사용됨) ISS (Internet Security Scanner) : 상업적인 스캐닝도구 Nessus : 서버내의 취약점(헛점)들을 점검해주는 도구 CGI scanner : 웹서버의 취약점을 스캐닝하는 도구 (cgi 스크립트 스캐닝) Courtney : per로 되어 있는 SATAN, SAINT 검색기 IcmpInfo : DOS공격등을 하는 ICMP 프로토콜의 .. 2009. 8. 26.