BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker. Check it out @ https://github.com/e-ago/bitcracker or use as a plugin for John The Ripper Jumbo version @ http://openwall.info/wiki/john/OpenCL-BitLocker
Category: cracking
Symantec analyzed the ransomware called CryptoDefense. Apparently, CryptoDefense uses Microsoft’s infrastructure and Windows API to generate the RSA 2048 encryption and decryption keys. The author only hands over the private key to decrypt the data when a $500 ransom is paid in Bitcoin within four days. Unfortunately the author failed to remove the private key, … Read More “CryptoDefense Flaw” »
Download links: wce_v1_4beta_universal.zip wce_v1_4beta_x64.zip wce_v1_4beta_x32.zip Changelog: version 1.4beta: May 30, 2013 * Several Bug Fixes * Windows 8 support * “Universal Binary” (single executable with both versions. Detects at runtime if it is running on a 32 bit or 64 bit version of Windows, dumps the appropriate version of WCE and executes it)
Added Windows 8 support in LSA Secret Dumper. Added Windows 8 support in Credential Manager Password Decoder. Added Windows 8 support in EditBox Revealer. Added ability to keep original extensions in fake certificates. Added support for Windows 8 RDP Client in APR-RDP sniffer filter. Winpcap library upgrade to version 4.1.3 (Windows8 supported). OUI List updated. … Read More “Cain & Abel v4.9.45 released” »
VMInjector is a tool designed to bypass OS login authentication screens of major operating systems running on VMware Workstation/Player, by using direct memory manipulation it can be used if the password of a virtual host is forgotten and requires reset. VMInjector can currently bypass locked Windows, Ubuntu and Mac OS X operation systems (x32 & … Read More “VMInjector – vmware guest unlocker” »
Explains how you can from a SQL injection gain access to the administration console, where you can then run commands on the system. From fingerprinting to injection, to cracking the md5 passwords, to writing a phpshell, where you can easily run commands. src: pentesterlab.com
The WiFi Protected Setup (WPS) protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours, using the open source tool called Reaver. Think your 32 character alpha-numeric password is uncrackable? If your wireless router is … Read More “WPA/WPA2 Cracking with Reaver” »