Rabu, 03 April 2013

Tools dan Software Untuk Decrypt Berbagai Macam Type Hash

welcome my blog sobat blogger, ini adalah my first post setelah lama vakum dari dunia blogging. ini di karenakan banyaknya target yang harus di capai oleh saya sendiri. kali ini baliona akan share seputar dunia hacking, seperti share tools dan software buatdecrypt tipe tipe hash, adapun type password ataupun type hash yang bisa di decrypt seperti


– MD5_HMAC($salt,MD5_HMAC($salt,$pass))
– SHA-1
– SHA-1(HMAC)
– SHA-1(Base64)
– SHA-256
– SHA-384
– SHA-512
– SHA-256(PasswordSafe)
– Haval-128
– Haval-160
– Haval-192
– Haval-224
– Haval-256
– Tiger-128
– Tiger-160
– Tiger-192
– Whirlpool
– RAdmin v2.x
– Domain Cached Credentials
– md5($pass.$salt)
– md5($salt.$pass)
– md5(md5($pass))
– md5(md5(md5($pass)))
– md5(md5($pass).$salt)
– md5(md5($salt).$pass)
– md5($salt.md5($pass))
– md5($salt.$pass.$salt)
– md5(md5($salt).md5($pass))
– md5(md5($pass).md5($salt))
– md5($salt.md5($salt.$pass))
– md5($salt.md5($pass.$salt))
– md5($salt.md5($pass).$salt)
– md5(sha1(md5(sha1($pass))))
– md5($hex_salt.$pass.$hex_salt)
– md5($username.md5($pass).$salt)
– md5(md5($username.$pass).$salt)
– sha1($salt.$pass)
– sha1($username.$pass)
– sha1($username.$pass.$salt)
– sha1($salt.sha1($salt.sha1($pass)))
Hash Joomla 1.0.13 keatas pake md5($pass.$salt)
– MySQL
– MySQL5
– DES(Unix)
– MD4
– MD4(HMAC)
– MD4(Base64)
– MD5
– MD5(APR)
– MD5(Unix)
– MD5(HMAC)
– MD5(Base64)
– MD5(phpBB3)
– MD5(WordPress)


Fitur Programnya :


– Passwords recovery using the following methods:
• Preliminary attack
• Brute force attack (including distributed attack)
• Mask attack
• Simple dictionary attack
• Combined dictionary attack
• Hybrid dictionary attack
• Rainbow attack
– Recovery of passwords of up to 127-character length
– Recovery of passwords for incomplete hashes of any type
– User hash editor
– Searching data on the list of imported users
– Quick-add hash using a dialog box
– Quick-add hashes from Clipboard
– Quick-check current password for all imported users
– Support of character replacement tables for hybrid dictionary attack
– Unlimited number of dictionaries available for dictionary attack
– Unlimited number of tables available for Rainbow attack
– Unlimited number of servable users with hashes (in the licensed version)

Bagi yang ingin download software ini, bisa di lihat di bawah ini

Link download


sebelum sobat blogger menggunakan software ini sebaiknya sobat blogger membacaLicense Agreementdi situs resminya. sekalian sobat blogger lihat cara menggunakan dari software ini.
ini web resminya —-> insidepro.com
tapi ada yang menarik dari software ini brothers icon biggrin Share tools dan software buat decrypt type type hash . software ini fungsinya bukan hanya sebagai hash password saja, tapi software ini juga berfungsi sebagai tools attack juga. adapun type attack yang di support dari tools ini ialah :
Preliminary Attack – this is a quick check of user hashes for matching to simple passwords like “123″, “qwerty”, “99999″, etc., as well as to passwords found by the program earlier.
Brute Force Attack – this is the exhaustive search through all possible passwords in a certain range; e.g., “aaaaaa”…”zzzzzz”.
Mask Attack – this attack is used when some information on the lost password is known. To use the attack, make sure to specify the mask for each character in the password to be recovered in the attack settings. For mask characters you can use the conventional characters for the standard or custom character sets – ?u, ?d, ?2, etc. (see the “Character Sets” tab in the program’s settings).
Simple Dictionary Attack – during this attack, the program simply checks hashes against passwords in dictionaries.
Combined Dictionary Attack – during this attack, passwords are made of several words taken from different dictionaries. That allows to recover complex passwords like “superadmin”, “admin*admin”, etc.
Hybrid Dictionary Attack – this attack allows modifying passwords taken from dictionaries (for example, shift the password to upper case, append ’1′ to the end of the password, etc.) and validating them as user passwords. The actions performed over source passwords are called “rules”, and the full list of those is available in the file “Rules.txt” in the software distributive.
Rainbow Attack – this attack attempts to recover passwords using the pre-calculated Rainbow tables.
The software includes the following plugins (to obtain more information, see the file “ReadMe.txt” in the folder containing each plugin):
Dictionary Generator – generates dictionaries of passwords from a specified range and performs other functions related to using dictionaries – sorting, merging to one file, etc.
Hash Bruteforcing History – codes and decodes history of hash bruteforcing.
Hash Generator – generates hashes of all types loaded in the program.
Hash Queue – handles queues of hSoftwareashes downloaded from the Internet.
Hidden Passwords Recovery – recovers text hidden behind asterisks.
NTLM Password Finder – attempts to find the NTLM password on the PasswordsPro hash list with a known LM password by checking it in all possible character cases.
Password Generator – generates random passwords with specified parameters.
Password Sender – sends recovered passwords to websites.
SQL Dump Parser – extracts hashes from SQL dumps of various forums.
Text Converter – converts text from Base64 to plain text format and the other way around.
Semoga saja tools or  Software yang baliona share ini bermanfaat bagi sobat bloggers semua. adapun tujuan dari pembuatan software di atas adalah untuk merecovery dari password kita yang lupa. tapi kalau bagi dunia hacking software di atas bisa menjadi sesuatu yang sangat di minati. karna banyak dari attacker or defacer yang mengalami masalah ketika ingin mendecrypt dari password yang mereka hunting. icon biggrin Share tools dan software buat decrypt type type hash

Posting Lebih Baru Posting Lama Beranda

1 Komentar:

thanks kakak, software nyaa,

Posting Komentar