- 在线时间
- 9363 小时
- 威望
- 22462
- 金币
- 859393
- 贡献
- 100
- 最后登录
- 2024-12-22
- 注册时间
- 2009-9-8
- 精华
- 0
- 积分
- 916240
- 阅读权限
- 150
- 帖子
- 34285
- 在线时间
- 9363 小时
- 威望
- 22462
- 贡献
- 100
- 最后登录
- 2024-12-22
- 注册时间
- 2009-9-8
- 积分
- 916240
- 阅读权限
- 150
- 帖子
- 34285
|
中文名: 密码恢复软件
英文名: InsidePro PasswordsPro
资源格式: 压缩包
版本: v3.1.0.0/含破解文件
发行时间: 2011年
制作发行: Copyright © 2003-2011 InsidePro Software
地区: 俄罗斯
语言: 英文,多语言
简介:
引用
Overwrite PasswordsPro.exe with cracked file
软件类型:软件>安全相关
软件性质:破解软件
操作系统:Windows
软件介绍:
PasswordsPro 一款用来恢复 MD4 hashes、MD5 hashes、MySQL hashes、SHA-1 hashes、星号密码等的工具,支持暴力破解字典破解分布式破解等多种手段,速度很快,普通计算机上面每秒可达数百万口令,还可以用来它来生成密码和字典
PasswordsPro是一款用来恢复DES(Unix),MD4 哈希MD5 哈希,MySQL 哈希,SHA-1 哈希,域缓存凭证以及星号密码等的工具,同时PassWordsPro也支持不同的PHP程序的哈希算法,程序拥有暴力破解,掩码破解,字典破解,彩虹表破解,分布式破解等多种手段,速度很快,普通计算机上面每秒可达数百万口令,还可以用来它来生成密码和字典.PasswordsPro程序包含"字典生成器","密码生成器","哈希生成器","文本转换器",用于查看星号密码的"隐藏密码恢复"及用于显示"系统信息"等的多款小工具.
This program is designed for recovering passwords to hashes of the following types:
– MySQL
– MySQL5
– DES(Unix)
– DES(Oracle)
– MD2
– MD2(HMAC)
– MD4
– MD4(HMAC)
– MD4(Base64)
– MD5
– MD5(APR)
– MD5(Unix)
– MD5(HMAC)
– MD5(Base64)
– MD5(phpBB3)
– MD5(Wordpress)
– MD5(Cisco PIX)
– MD5_Middle
– MD5(HMAC(Wordpress))
– NTLM
– SHA-1
– SHA-1(HMAC)
– SHA-1(Base64)
– SHA-1(Django)
– SHA-224
– SHA-224(HMAC)
– SHA-256
– SHA-256(HMAC)
– SHA-256(Unix)
– SHA-256(Django)
– SHA-256(Base64)
– SHA-256(md5($pass))
– SHA-256(PasswordSafe)
– SHA-384
– SHA-384(HMAC)
– SHA-384(Django)
– SHA-512
– SHA-512(HMAC)
– SHA-512(Unix)
– SSHA-1
– HAS-160
– Haval-128
– Haval-128(HMAC)
– Haval-160
– Haval-160(HMAC)
– Haval-192
– Haval-192(HMAC)
– Haval-224
– Haval-224(HMAC)
– Haval-256
– Haval-256(HMAC)
– Tiger-128
– Tiger-128(HMAC)
– Tiger-160
– Tiger-160(HMAC)
– Tiger-192
– Tiger-192(HMAC)
– RipeMD-128
– RipeMD-128(HMAC)
– RipeMD-160
– RipeMD-160(HMAC)
– RipeMD-256
– RipeMD-256(HMAC)
– RipeMD-320
– RipeMD-320(HMAC)
– Snefru-128
– Snefru-128(HMAC)
– Snefru-256
– Snefru-256(HMAC)
– MSSQL(2000)
– MSSQL(2005)
– Skein-256(128)
– Skein-256(160)
– Skein-256(224)
– Skein-256
– Skein-512(128)
– Skein-512(160)
– Skein-512(224)
– Skein-512(256)
– Skein-512(384)
– Skein-512
– Skein-1024(384)
– Skein-1024(512)
– Skein-1024
– Ventrilo
– Whirlpool
– Whirlpool(HMAC)
– RAdmin v2.x
– Lineage II C4
– GOST R 34.11-94
– Blowfish(Eggdrop)
– Blowfish(OpenBSD)
– Domain Cached Credentials
– md5(md5($pass))
– md5(strtoupper(md5($pass)))
– md5(md5(md5($pass)))
– md5(md5(md5(md5($pass))))
– md5(md5(md5(md5(md5($pass)))))
– md5($pass.$salt)
– md5(sha1($pass))
– md5(sha1(md5(sha1($pass))))
– md5($salt.$pass)
– md5($salt.md5($pass))
– md5($salt.$pass.$salt)
– md5($salt.'–'.md5($pass))
– md5(md5($salt).$pass)
– md5(md5($salt).md5($pass))
– md5(md5($pass).$salt)
– md5(md5($pass).md5($salt))
– md5(md5($username.$pass).$salt)
– md5($salt.$pass.$username)
– md5($salt.md5($salt.$pass))
– md5($salt.md5($pass.$salt))
– md5($salt.md5($pass).$salt)
– md5($username.md5($pass).$salt)
– md5($username.'\0'.$pass), the file "md5($username.0.$pass).dll"
– md5($username.'\n'.$pass), the file "md5($username.LF.$pass).dll"
– sha1(md5($pass))
– sha1(sha1($pass))
– sha1(sha1($pass).$salt)
– sha1(sha1(sha1($pass)))
– sha1($pass.$salt)
– sha1($salt.$pass)
– sha1($salt.sha1($pass))
– sha1($salt.sha1($salt.sha1($pass)))
– sha1($username.$pass)
– sha1($username.$pass.$salt)
– sha1($username.':'.$pass), the file "MaNGOS2.dll"
– sha1(strtolower($username).$pass)
– sha1(strtoupper($username).':'.$pass), the file "MaNGOS.dll"
– Adler-32
– CRC-16
– CRC-16-CCITT
– CRC-32
– CRC-32B
– CRC-64
– ELF-32
– FCS-16
– FCS-32
– Fletcher-32
– FNV-32
– GHash-32-3
– GHash-32-5
– XOR-32
The software's primary features include:
– 7 types of attacks for recovering passwords to hashes.
– Maximum number of hashes in the licensed version reaches 10 millions.
– Comfortable and quick handling of large hash lists.
– Recovery of passwords of up to 127-characters length long.
– Recovery of passwords for to incomplete hashes of any type.
– Recovery of passwords in Unicode.
– Support for third-party developer's hashing modules.
– Support for using plugins.
– Editing user hashes and other data.
– Adding hashes to the list from a text file using a dialog window or clipboard.
– Copying hashes and found passwords to clipboard.
– Exporting hashes to text or HTML file.
– Searchable list of users with hashes.
– Checking current password against all or selected users on the list.
– Verifying user hashes and their passwords.
– Automatic accumulation of found passwords in the file "PasswordsPro.dic".
– Sorting hash list.
– Exporting hashes with found passwords in the format common for the InsidePro Software forum.
– Support for the "hidden" operating mode – when the program doesn't appear on the taskbar.
Types of attacks supported by the software:
Preliminary Attack – this is a quick check of user hashes for matching to simple passwords like "123", "qwerty", "99999", etc., as well as to passwords found by the program earlier.
Brute Force Attack – this is the exhaustive search through all possible passwords in a certain range; e.g., "aaaaaa"..."zzzzzz".
Mask Attack – this attack is used when some information on the lost password is known. To use the attack, make sure to specify the mask for each character in the password to be recovered in the attack settings. For mask characters you can use the conventional characters for the standard or custom character sets – ?u, ?d, ?2, etc. (see the "Character Sets" tab in the program's settings).
Simple Dictionary Attack – during this attack, the program simply checks hashes against passwords in dictionaries.
Combined Dictionary Attack – during this attack, passwords are made of several words taken from different dictionaries. That allows to recover complex passwords like "superadmin", "admin*admin", etc.
Hybrid Dictionary Attack – this attack allows modifying passwords taken from dictionaries (for example, shift the password to upper case, append '1' to the end of the password, etc.) and validating them as user passwords. The actions performed over source passwords are called "rules", and the full list of those is available in the file "Rules.txt" in the software distributive.
Rainbow Attack – this attack attempts to recover passwords using the pre-calculated Rainbow tables.
The software includes the following plugins (to obtain more information, see the file "ReadMe.txt" in the folder containing each plugin):
Dictionary Generator – generates dictionaries of passwords from a specified range and performs other functions related to using dictionaries – sorting, merging to one file, etc.
Hash Bruteforcing History – codes and decodes history of hash bruteforcing.
Hash Generator – generates hashes of all types loaded in the program.
Hash Queue – handles queues of hashes downloaded from the Internet.
Hidden Passwords Recovery – recovers text hidden behind asterisks.
NTLM Password Finder – attempts to find the NTLM password on the PasswordsPro hash list with a known LM password by checking it in all possible character cases.
Password Generator – generates random passwords with specified parameters.
Password Keeper – stores passwords or any other confidential data in a universal encrypted database.
Password Sender – sends recovered passwords to websites.
SQL Dump Parser – extracts hashes from SQL dumps of various forums.
System Information – displays overall system information.
Text Converter – converts text from Base64 to plain text format and the other way around.
[安全检测]
★未经过安全检测
[安装测试]
★未经过安装测试,使用者后果自负与本论坛无关。
[免责声明]
★本帖介绍的文本内容转自网络,如有出入则以官方站点公布之信息为准,凡摘自网络相关图文介绍内容的本帖不另行标注出处,原创作者如有异议可提出以便删除。
★关于软件破解及注册机可能被杀毒软件报病毒或间谍木马(若已检测到的则将在帖中特别标注),请自行甄别和取舍,不另行加以解释。
★资源下载后请对文件做必要的安全检测,该下载内容仅限于个人测试学习之用,不得用于商业用途,并且请在下载后24小时内删除。
★各计算机系统环境各不相同,因此不保证该软件完全兼容于你的计算机系统,最终解决软件安装运行问题请联络官方站点寻求相关技术支持。
★凡标注为下载链接转自其他站点的,无法保证资源的供源以及资源本身等情况的完整性和可用性(不可控)。
★资源版权归作者及其公司所有,如果你喜欢,请购买正版。
迅雷或电驴下载:[瀵嗙爜鎭㈠杞欢].InsidePro.PasswordsPro.v3.1.0.0.Cracked-CHiLi.zip (15.51 MB) |
|