PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : Hash - Cracken like Seti@Home | MD (2, 4, 5) | SHA xxx | ...



Alter-Ego
29.07.2007, 19:33
Habe gerade ein interessantes Projekt gefunden welchen wie SETI@Home Hasch werte entschlüsselt.


UDC is a program designed for auditing of the authorization systems, which also provides methods for secure passwords storing.

* The main purpose of UDC is the recovery of the passwords by the given hash-values (NTLM, MD5, SQL, SHA1 and 40+ other). The typical user can recover own forgotten passwords, for example, Windows NT/XP/2003 authorization passwords.

* Organizations can observe the local security level; for instance, administration of e-mail server can reveal "weak" passwords in the system using the UDC in just several minutes.

* Multithreaded and distributed recovery modes are supported. The new method for precalculating Hybrid Attack using Rainbow Tables is introduced. Now there's nothing unbreakable...


icon Brief about the UDC:

# Mask Attack: cracking 5000 composite Windows NT passwords in 15 minutes with the average speed over 7 000 000 passwords per second on Pentium IV 3.4Ghz.
# Over 5 000 000 of dictionary words per second on Pentium IV 3.4Ghz while recovering Windows password.
# Hybrid Attack with significantly extended settings at the same speed as bruteforce; over 6 000 000 pwd/s on Pentium IV 3.4Ghz while cracking Windows password (NTLM).
# Now the Typing-Mistake Correction attack mode is available. Recovery of your own forgotten passwords in seconds!
# Encovered with the modern user interface (view the screenshots!)
# Unique cryptanalytic program that supports extra wide hash-functions list: MD (2, 4, 5); NTLM; Adler; CRC (16, 32, 16CC); XOR (16, 32); GOST R 34.11; Haval (128 - 256); Panama; RMD (128 - 320); SHA (160 - 512); Sapphire (128 -320); Snefru (128, 256); Tiger; Whirlpool.
# Unlimited hash-values count. Unlimited hash/password strings lengths.
# Open API. You can use the UDC in your own products as a hash-library or extend it by your own algorithms.
# The extreme power of distributed attack in the real-time with the automatical local-network configurator.
# The next step Rainbow Tables are implemented: now you can precalculate the Hybrid Attack and recover the passwords with unlimited characters count in a short time.
# Not just another Windows passwords cracker; it's universal cryptanalytic tool.

Selbst nicht Probiert da kein bedarf aber mit sicheheit ein interessantes Projekt.

http://www.the-udc.com/