Penetration Testing mailing list archives

Re: OphCrack 2.2 released


From: Mathieu CHATEAU <gollum123 () free fr>
Date: Sun, 26 Mar 2006 13:50:08 +0200

Saturday, March 25, 2006, 8:04:26 PM, you wrote:

JA> Ophcrack is a Windows password cracker based on a time-memory trade-off
JA> using rainbow tables. This is a new variant of Hellman's original
JA> trade-off, with better performance. It recovers 99.9% of alphanumeric
JA> passwords in seconds.

JA> Changes:
JA> v 2.2  - (feature) support of the new table set (alphanum + 33 special
JA> chars - WS-20k)
JA>        - (feature) easier configuration for the table set (tables.cfg)
JA>        - (feature) automatic definition of the number of tables to use
JA> at the same time (batch_tables) by queriying the system for the size of
JA> the memory
JA>        - (feature) speed-up in tables reading
JA>        - (feature) cleaning of the memory to make place for table
JA> readahead (linux version only)
JA>        - (feature) improved installer for windows version
JA>        - (fix) change of the default share for pwdump4 (ADMIN$)


JA> http://sourceforge.net/projects/ophcrack

JA> Greets to Philippe Oechslin & Cedric Tissieres

tested on XP SP2

works much better than 2.1



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: