ophcrack_1_0a
所属分类:网络
开发工具:Visual C++
文件大小:4995KB
下载次数:11
上传日期:2008-04-30 15:01:44
上 传 者:
tianwen
说明: 跟rainbow table结合破解windoes登陆密码及各种hash密码
(Combined with the rainbow table to crack passwords and various landing windoes password hash)
文件列表:
ophcrack_1_0a (0, 2004-09-17)
ophcrack_1_0a\CHANGELOG.TXT (39, 2004-09-17)
ophcrack_1_0a\gpl.txt (15076, 2004-09-13)
ophcrack_1_0a\hash20 (660, 2004-09-13)
ophcrack_1_0a\LICENCE.TXT (982, 2004-09-13)
ophcrack_1_0a\linux (0, 2004-09-13)
ophcrack_1_0a\linux\binarize (2349628, 2004-09-13)
ophcrack_1_0a\linux\ophcrack (2554013, 2004-09-13)
ophcrack_1_0a\linux\precomp (2562655, 2004-09-13)
ophcrack_1_0a\linux\test.sh (322, 2004-09-13)
ophcrack_1_0a\linux\test_hash (2338420, 2004-09-13)
ophcrack_1_0a\linux\test_speed (2328641, 2004-09-13)
ophcrack_1_0a\samdump.txt (254, 2004-09-13)
ophcrack_1_0a\src (0, 2004-09-13)
ophcrack_1_0a\src\binarize.c (5121, 2004-09-13)
ophcrack_1_0a\src\Makefile (1525, 2004-09-13)
ophcrack_1_0a\src\make_hash.c (2448, 2004-09-13)
ophcrack_1_0a\src\make_hash.h (1545, 2004-09-13)
ophcrack_1_0a\src\make_redux.c (3958, 2004-09-13)
ophcrack_1_0a\src\make_redux.h (1501, 2004-09-13)
ophcrack_1_0a\src\ophcrack.c (14905, 2004-09-13)
ophcrack_1_0a\src\precomp.c (5752, 2004-09-13)
ophcrack_1_0a\src\test_hash.c (2262, 2004-09-13)
ophcrack_1_0a\src\test_speed.c (2100, 2004-09-13)
ophcrack_1_0a\windows (0, 2004-09-13)
ophcrack_1_0a\windows\binarize.exe (17084, 2004-09-13)
ophcrack_1_0a\windows\cygwin1.dll (1153417, 2004-09-13)
ophcrack_1_0a\windows\ophcrack.exe (102424, 2004-09-17)
ophcrack_1_0a\windows\precomp.exe (97018, 2004-09-13)
ophcrack_1_0a\windows\test.bat (256, 2004-09-13)
ophcrack_1_0a\windows\test_hash.exe (89181, 2004-09-13)
ophcrack_1_0a\windows\test_speed.exe (88668, 2004-09-13)
OPHCRACK (Time-Memory-Trade-Off-Crack)
A windows password cracker based on the faster time-memory trade-off using
rainbow tables. This program is given as an example of efficient
implementation of rainbow tables. It is limited to alphanumerical
passwords. Feel free to make your own extensions.
CONTENTS:
Directories:
src - source files and Makefile
linux - precompiled linux executables
windows - precompiled windows executables
Main programs:
ophcrack - the password cracker
precomp - a program for creating rainbow tables (in ascii format)
binarize - compress ascii tables into more compact binary format
Utilities:
test_hash - generate lanmanhash and nthash from a password
test_speed - Test the speed of hash and reduction functions
COMPILING:
You need libssl and libssl-devel to compile the programs.
Type make to make all programs.
TESTING:
Run the test script (test.sh in the linux directory, test.bat in the windows
directory) to run a test that generates a small set of tables and
recovers a password using these tables.
EXAMPLES:
This is what the test script does to create tables and crack a password:
create a first table (table0) in directory Test (which must exist). This table
is made from 4000 rainbow chains of length 1000. Merging chains will be
removed. The remaining table is a so-called 'perfect' table (smaller and more efficient):
./precomp -d Test/ -t 1000 -m 4000 0
create second table (table1):
./precomp -d Test/ -t 1000 -m 4000 1
convert tables to binary representation:
cd Test && ../binarize table0 && ../binarize table1
you may want to delete the ascii version of the tables now:
cd Test && rm table0 && rm table1
Now use the cracker to find a password:
./ophcrack -s -t 1000 -d Test/ -n 2 3b5d42***276d312ee516b06b1b1dc3a9:fff23d5f2a088b0bc952337fbaa8d6c4
You can also get the hashes from a windows sam dump, e.g. by using pwdump2. In
that case just provide the filename instead of a hash:
./ophcrack -s -t 1000 -d Test/ sam.txt
ADVANCED GENERATION OF TABLES:
The above tables are very small and will only find a fraction of passwords. If
you were to build larger tables, say four tables starting with 100'000'000
chains of length 5000, you can make use of the following
optimizations:
- build tables stepwise:
Rather than creating 100'000'000 chains of length 5000 and then removing the
merges, you can remove the merges along the way by building the table
stepwise:
mkdir big
# stop and remove merges after 100 columns
./precomp -d big/ -t 5000 -m 100000000 -s 100 0
./precomp -d big/ -t 5000 -m 100000000 -s 100 1
./precomp -d big/ -t 5000 -m 100000000 -s 100 2
./precomp -d big/ -t 5000 -m 100000000 -s 100 3
# append the next 300 columns and remove merges
./precomp -d big/ -t 5000 -s 300 0
./precomp -d big/ -t 5000 -s 300 1
./precomp -d big/ -t 5000 -s 300 2
./precomp -d big/ -t 5000 -s 300 3
# append the next 1100 columns and remove merges
./precomp -d big/ -t 5000 -s 1100 0
./precomp -d big/ -t 5000 -s 1100 1
./precomp -d big/ -t 5000 -s 1100 2
./precomp -d big/ -t 5000 -s 1100 3
# append the next 3500 columns and remove merges
./precomp -d big/ -t 5000 -s 3500 0
./precomp -d big/ -t 5000 -s 3500 1
./precomp -d big/ -t 5000 -s 3500 2
./precomp -d big/ -t 5000 -s 3500 3
cd big
binarize table0; binarize table1; binarize table2; binarize table3
- parallelizing the table generation:
You can generate each table on a different machine. If you want to parallelize
further, you can generate slices of each table on different machines. In that
case, merges between different slices are only removed when reuniting the
tables:
#on machine1:
./precomp -d lower/ -t 5000 -m 50000000 -s 100 0
./precomp -d lower/ -t 5000 -s 300 0
./precomp -d lower/ -t 5000 -s 1100 0
./precomp -d lower/ -t 5000 -s 3500 0
#on machine2
./precomp -d upper/ -t 5000 -m 50000000 -M 50000000 -s 100 0
./precomp -d upper/ -t 5000 -s 300 0
./precomp -d upper/ -t 5000 -s 1100 0
./precomp -d upper/ -t 5000 -s 3500 0
cat lower/table0 upper/table0 | sort -k 1.7 > big/table0
MEMORY USAGE AND SPEED CONSIDERATIONS
By default, ophcrack will only load one table at time in memory. If you have
enough memory, use the -n option to specify how many tables to load in parallel.
Searching in tables in parallel is faster. Note that if you have only a few
passwords to crack, the cracking time will be dominated by the time needed to
load the tables from the hard disk. Shortest cracking times are achieved when
cracking a file containing many hashes (or cracking the same password twice in
a row, which may not be very useful).
Copyright Philippe Oechslin, July 2004 (philippe.oechslin@epfl.ch)
The file LICENCE.TXT contains the copyright licence of this program.
近期下载者:
相关文件:
收藏者: