ophcrack_1_0a

所属分类:网络
开发工具:Visual C++
文件大小:4995KB
下载次数:11
上传日期:2008-04-30 15:01:44
上 传 者tianwen
说明:  跟rainbow table结合破解windoes登陆密码及各种hash密码
(Combined with the rainbow table to crack passwords and various landing windoes password hash)

文件列表:
ophcrack_1_0a (0, 2004-09-17)
ophcrack_1_0a\CHANGELOG.TXT (39, 2004-09-17)
ophcrack_1_0a\gpl.txt (15076, 2004-09-13)
ophcrack_1_0a\hash20 (660, 2004-09-13)
ophcrack_1_0a\LICENCE.TXT (982, 2004-09-13)
ophcrack_1_0a\linux (0, 2004-09-13)
ophcrack_1_0a\linux\binarize (2349628, 2004-09-13)
ophcrack_1_0a\linux\ophcrack (2554013, 2004-09-13)
ophcrack_1_0a\linux\precomp (2562655, 2004-09-13)
ophcrack_1_0a\linux\test.sh (322, 2004-09-13)
ophcrack_1_0a\linux\test_hash (2338420, 2004-09-13)
ophcrack_1_0a\linux\test_speed (2328641, 2004-09-13)
ophcrack_1_0a\samdump.txt (254, 2004-09-13)
ophcrack_1_0a\src (0, 2004-09-13)
ophcrack_1_0a\src\binarize.c (5121, 2004-09-13)
ophcrack_1_0a\src\Makefile (1525, 2004-09-13)
ophcrack_1_0a\src\make_hash.c (2448, 2004-09-13)
ophcrack_1_0a\src\make_hash.h (1545, 2004-09-13)
ophcrack_1_0a\src\make_redux.c (3958, 2004-09-13)
ophcrack_1_0a\src\make_redux.h (1501, 2004-09-13)
ophcrack_1_0a\src\ophcrack.c (14905, 2004-09-13)
ophcrack_1_0a\src\precomp.c (5752, 2004-09-13)
ophcrack_1_0a\src\test_hash.c (2262, 2004-09-13)
ophcrack_1_0a\src\test_speed.c (2100, 2004-09-13)
ophcrack_1_0a\windows (0, 2004-09-13)
ophcrack_1_0a\windows\binarize.exe (17084, 2004-09-13)
ophcrack_1_0a\windows\cygwin1.dll (1153417, 2004-09-13)
ophcrack_1_0a\windows\ophcrack.exe (102424, 2004-09-17)
ophcrack_1_0a\windows\precomp.exe (97018, 2004-09-13)
ophcrack_1_0a\windows\test.bat (256, 2004-09-13)
ophcrack_1_0a\windows\test_hash.exe (89181, 2004-09-13)
ophcrack_1_0a\windows\test_speed.exe (88668, 2004-09-13)

OPHCRACK (Time-Memory-Trade-Off-Crack) A windows password cracker based on the faster time-memory trade-off using rainbow tables. This program is given as an example of efficient implementation of rainbow tables. It is limited to alphanumerical passwords. Feel free to make your own extensions. CONTENTS: Directories: src - source files and Makefile linux - precompiled linux executables windows - precompiled windows executables Main programs: ophcrack - the password cracker precomp - a program for creating rainbow tables (in ascii format) binarize - compress ascii tables into more compact binary format Utilities: test_hash - generate lanmanhash and nthash from a password test_speed - Test the speed of hash and reduction functions COMPILING: You need libssl and libssl-devel to compile the programs. Type make to make all programs. TESTING: Run the test script (test.sh in the linux directory, test.bat in the windows directory) to run a test that generates a small set of tables and recovers a password using these tables. EXAMPLES: This is what the test script does to create tables and crack a password: create a first table (table0) in directory Test (which must exist). This table is made from 4000 rainbow chains of length 1000. Merging chains will be removed. The remaining table is a so-called 'perfect' table (smaller and more efficient): ./precomp -d Test/ -t 1000 -m 4000 0 create second table (table1): ./precomp -d Test/ -t 1000 -m 4000 1 convert tables to binary representation: cd Test && ../binarize table0 && ../binarize table1 you may want to delete the ascii version of the tables now: cd Test && rm table0 && rm table1 Now use the cracker to find a password: ./ophcrack -s -t 1000 -d Test/ -n 2 3b5d42***276d312ee516b06b1b1dc3a9:fff23d5f2a088b0bc952337fbaa8d6c4 You can also get the hashes from a windows sam dump, e.g. by using pwdump2. In that case just provide the filename instead of a hash: ./ophcrack -s -t 1000 -d Test/ sam.txt ADVANCED GENERATION OF TABLES: The above tables are very small and will only find a fraction of passwords. If you were to build larger tables, say four tables starting with 100'000'000 chains of length 5000, you can make use of the following optimizations: - build tables stepwise: Rather than creating 100'000'000 chains of length 5000 and then removing the merges, you can remove the merges along the way by building the table stepwise: mkdir big # stop and remove merges after 100 columns ./precomp -d big/ -t 5000 -m 100000000 -s 100 0 ./precomp -d big/ -t 5000 -m 100000000 -s 100 1 ./precomp -d big/ -t 5000 -m 100000000 -s 100 2 ./precomp -d big/ -t 5000 -m 100000000 -s 100 3 # append the next 300 columns and remove merges ./precomp -d big/ -t 5000 -s 300 0 ./precomp -d big/ -t 5000 -s 300 1 ./precomp -d big/ -t 5000 -s 300 2 ./precomp -d big/ -t 5000 -s 300 3 # append the next 1100 columns and remove merges ./precomp -d big/ -t 5000 -s 1100 0 ./precomp -d big/ -t 5000 -s 1100 1 ./precomp -d big/ -t 5000 -s 1100 2 ./precomp -d big/ -t 5000 -s 1100 3 # append the next 3500 columns and remove merges ./precomp -d big/ -t 5000 -s 3500 0 ./precomp -d big/ -t 5000 -s 3500 1 ./precomp -d big/ -t 5000 -s 3500 2 ./precomp -d big/ -t 5000 -s 3500 3 cd big binarize table0; binarize table1; binarize table2; binarize table3 - parallelizing the table generation: You can generate each table on a different machine. If you want to parallelize further, you can generate slices of each table on different machines. In that case, merges between different slices are only removed when reuniting the tables: #on machine1: ./precomp -d lower/ -t 5000 -m 50000000 -s 100 0 ./precomp -d lower/ -t 5000 -s 300 0 ./precomp -d lower/ -t 5000 -s 1100 0 ./precomp -d lower/ -t 5000 -s 3500 0 #on machine2 ./precomp -d upper/ -t 5000 -m 50000000 -M 50000000 -s 100 0 ./precomp -d upper/ -t 5000 -s 300 0 ./precomp -d upper/ -t 5000 -s 1100 0 ./precomp -d upper/ -t 5000 -s 3500 0 cat lower/table0 upper/table0 | sort -k 1.7 > big/table0 MEMORY USAGE AND SPEED CONSIDERATIONS By default, ophcrack will only load one table at time in memory. If you have enough memory, use the -n option to specify how many tables to load in parallel. Searching in tables in parallel is faster. Note that if you have only a few passwords to crack, the cracking time will be dominated by the time needed to load the tables from the hard disk. Shortest cracking times are achieved when cracking a file containing many hashes (or cracking the same password twice in a row, which may not be very useful). Copyright Philippe Oechslin, July 2004 (philippe.oechslin@epfl.ch) The file LICENCE.TXT contains the copyright licence of this program.

近期下载者

相关文件


收藏者