Showing posts with label Password Crack. Show all posts
Showing posts with label Password Crack. Show all posts

Sunday, April 22, 2012

How to Use Ravan for Password Cracking?

In my previous article, i explained about the Ravan Tool.  Now let us see how to use the Ravan for cracking passwords.

Lot of Friends :
Ravan is Distributed password cracking method. So you will need lot of friends who have Pc with Internet connection. The speed of cracking will increase based on the number of pc contribute in the cracking.

How to use Ravan?

  • Go to
  • Enter the value of the hash that must be cracked
  • Enter the value of the salt, if it is not a salted hash then leave it blank
  • Enter the charset. Only these characters will be use in the brute force attack
  • Select the hashing algorithm (MD5, SHA1, SHA256, SHA512)
  • Select the position of the salt. (clear-text+salt or salt+clear-text)
  • Hit ‘Submit Hash’
Step 2:
 If hash is successfully submitted, it would return a URL.  Now you just need to send this URL to all your friends and ask them to click the start button.

    The main page manages the cracking so it must not be closed or the cracking would fail.

That is it. Once your friends click start they would be doing pieces of the work and submitting results back.

The main page would constantly monitor the progress of the cracking process and manage it across all the workers. You would be able to see the stats throughout the process, once the hash is cracked the clear-text value is displayed.

Continue   Reading>>

Ravan , JavaScript based Distributed Password cracking

You want to crack a hash but your system speed is low?! No need to worry..! Here is solution for you , "Distributed Password Cracking". Let me introduce a new tool called "Ravan" developed by LavaKumar.
About Ravan:
Ravan is a JavaScript based Distributed Computing system that can perform brute force attacks on salted hashes by distributing the task across several browsers. It makes use of HTML5 WebWorkers to start background JavaScript threads in the browsers of the workers, each worker computes a part of the hash cracking activity.
Ravan now supports MD5,SHA1,SHA256,SHA512 hashes.

How it works?
Ravan has three components:

The hash, salt, hashing algorithm, position of the salt (before or after salt) and the charset are submitted by the user. These are submitted to the web backend and it returns a ‘hash id’ which is unique to every submitted hash. It also supplies a ‘worker url’ specific to this hash that must be sent to potential workers.
Once the hash is submitted the master creates arrays of slots (each array contains 5 slots), this is submitted to the web backend. Each slot represents a small part of the keyspace, this is how the entire activity is broken down in to multiple tiny tasks. A single slot represents 1 million combinations.
The master constantly polls the web backend to check on the progress of the cracking process. As the existing list of slots is completed by the workers the master allots more slots. When a worker cracks the hash and returns the clear-text value the master confirm this and then signals all workers to stop cracking.

Web Backend:
The web backend acts as a proxy between the master and the workers. It does not perform any actual computation but validates the data submitted by both the parties and passes information between them.

The worker performs the actual hard work of cracking the hashes. Each hash has a unique worker URL and this page explicitly asks for the user permission before the cracking process is started. Once the user accepts and clicks ‘Start’ the worker polls the web backend for available slots, the web backend returns an array of slots from its database. The worker cracks each slot and sends the result to the web backend. After completing all the slots it polls the web backend for more slots.

Here is the tool:

Tutorial: How to use Ravan Tool?
Continue   Reading>>

Sunday, December 4, 2011

Large Password List: Free Download Dictionary File for Password Cracking

For password cracking, you can choose two different methods 1. Dictionary Attack 2. Brute Force Attack. The Dictionary attack is much faster when compared to Brute force attack.(There is another method named as "Rainbow table", it is similar to Dictionary attack).

In order to achieve success in dictionary attack, we need a large size of Password list.

Here is the list of 1,717,681 passwords(Free to download):

If you didn't get success using the above password list, then you can get the UNIQPass dictionary file from dazzlepod.

UNIQPASS is large password list useful for use with John the Ripper (JtR) wordlist mode to translate even more hashes into cleartext passwords. While we have had good success rate with our standard password list passwords.txt (17.5MB), we realized the list can be made more useful and relevant if we include commonly used passwords from the recently leaked databases belonging to large websites. As a result, we have compiled millions of unique passwords into UNIQPASS.

UNIQPASS is available for purchase at only $4.99; see preview of UNIQPASS from these 2 million randomly selected passwords (18.9MB).

Get the UNIQPass Dictionary file from here:
Continue   Reading>>

Thursday, September 15, 2011

How to crack or Reset BIOS Password? ~Cracking Tutorials

The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot firmware'). The primary function of the BIOS is to set up the hardware and load and start a boot loader. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates software held on a peripheral device (designated as a 'boot device'), such as a hard disk or a CD/DVD, and loads and executes that software, giving it control of the PC. This process is known as booting, or booting up, which is short for bootstrapping.
Bios password is usually used to protect the user's BIOS settings on the computer. If you want to reset the password on the BIOS does not need to bother to connect bateray CMOSnya, with a little trick on the Dos you can reset the BIOS password on it in 2 ways:

1. Clear CMOS
This way I consider the most ancient and most easy to break down the password on the BIOS. The steps are easy, first open the casing cover computer CPU. Then find the bios battery that looks something like the battery just a little more big clock. After the meet and consider the area around the battery there is usually a jumper with 3 pins, 2 pins and 1 pin not connected.

Suppose the three pins with the code 1 - 2 - 3. Connector that connects the initial position usually is 2-3. To reset the bios do I move the position of the plug that connects pins 2-3 to position 1-2 for about 5 seconds. Then plug it back into the starting position (2-3). Try restarting the computer back on, secured the bios password is gone.

If the above looks complicated, is easy to clear cmos by unplugging the BIOS battery and then put it back. But with the consequences of removing the label is the warranty on the battery BIOS.

2. Through DOS

First out of the windows with me restart your computer, start the computer in MS-DOS mode, use the option "Command Prompt Only"

At c: prompt, type: DEBUG
press enter. You will see the sign (-) at the DEBUG prompt, then type:
o 70 2e
at the DEBUG prompt will be displayed as-o 70 2e.
press enter and type:
-O 71 ff
press enter, the last type:
hit enter, then you will get out of the DEBUG prompt and return to the C:> prompt.
Now restart your COMPUTER, and see the results

Continue   Reading>>

Sunday, August 28, 2011

How to Recover Windows 7 Password~Windows Password Killer Tool

I have explained how to recover the lost password using Backtrack Password Cracking. Here i am going to introduce a new tool named as Windows Password Killer. It enables you remove windows 7 password to reset the administrator, standard user and guest passwords easily without any data losing or file damage.

There is 3 different editions - the Lite, Pro and Ultimate, here we take the Pro edition as an example for the password remove process with USB drive (CD/DVD also supported too).

1. Any Accessible Computer.
2.USB Drive or CD/DVD

Step 1: Install Password Killer
Download the Windows Windows Password Killer from Here. 
Install the windows Password Killer in your friends or any accssible computer.
Step 2:Burn a bootable CD/DVD or an USB drive
  1. Insert the USB Drive or CD/DVD.
  2. Run the Windows Password Killer.
  3. Select the USB drive or CD/DVD.
  4. click the Create button.
  5. It will ask you to verify whether you select correct disk or not. Click "Yes" button.

Step 3: Boot from USB Drive OR CD/DVD 
Now let us come to our locked computer.
  • Insert your USB Drive before turn on the system(if you are using CD/DVD, you have to turn on and insert). 
  • Now turn on the system, press F10 or F12(it may vary for your system) to choose the booting device. 
  • Select the USB drive or CD/DVD.
It will boot into Windows Password Killer.

Step4 : Reseting Password
After program starts, select Windows 7 system on the start page, click 'Next'.

Select your target user accounts, and then click 'Next' to proceed the Windows 7 password recovery/unlock process.

The Windows 7 Administrator password or other user accounts password is reset successfully now. Take out the password reset CD/DVD, click 'Reboot' to restart your computer.

Want to say thanks?!
Sorry i don't need your thanks, i just want your like in my Facebook Fan page.
or Just follow us in twitter:
or Just share this with your friends.
Thank you from BreakTheSec, if you did.

Continue   Reading>>

Thursday, August 4, 2011

How to Install John The Ripper On Ubuntu Linux? -Works for All Linux

This article will guide you how to install John The Ripper Tool(Password Cracker) in your ubuntu or Any other Linux and Unix Based System.

1. John The Ripper: Download the Latest and Free Version from here:
 It will be in tar.gz format, namely john-1.7.7.tar.gz 

Continue   Reading>>

John The Ripper Tutorial-Password Cracking Softwares

What is John the Ripper?
John the Ripper is a fastest and Best Password Cracking software. It is compatible with many flavours of Unix, Windows, DOS, BeOS, and OpenVMS.

Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus many more with contributed patches

Info about John The Ripper:
  • It is command Line Password Cracker(Don't worry , i will guide how to use John the Ripper?).
  •  John The Ripper is available for free
  • JohnTheRipper is pre Installed in Backtrack Linux
  • You can download it for other Linux Versions or any other operating system(Eg:windows xp).  
  • Supports Both Brute Force and Dictionary Attack Methods
  • Fast and Best password Cracker.
Download John The Ripper From Here:
More Articles About John The Ripper:
How to Install John The Ripper on Linux and Windows?

Continue   Reading>>

Tuesday, July 19, 2011

How to Crack password protected RAR files like a hacker (Brute Force attack)?

Install the RAR password remover software as said in my last post.
Let me show how to crack the password protected RAR files using Brute Force attack method.

Step 1:
Run the application start->Allprograms->RAR password Recovery->RAR password Recovery

Step 2:
Continue   Reading>>

Monday, July 18, 2011

Rar Password Remover Tool | Password Cracking

  • Sometimes if you download rar files from internet, it may be password protected.
  • In your friends laptop they may have password protected rar files.
  • Sometimes you may forget password for your rar files
What will you do in these situation? Yes.there is solution for these situation. You can use the RAR p
Continue   Reading>>

Tuesday, June 7, 2011

How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial

In this post, i am going to help you to crack the any type of windows accounts passwords. Learn how to hack the windows admin password like a geek.

This is My Second Backtrack Linux Tutorial.
[see the screen shots of this tutorial ]

Refer this link also: How to hack the windows 7 or vista using the following method

  • BackTrack Linux 4 or 5. Download it from
  • One pen drive(above 4gb)
  • Xp Free Fast RainBow table []. Download it from here: 
*Install the Backtrack Linux in the pen drive with small amount of persistent memory.

Step 1: Booting From Back Track
Insert the pen drive in target computer[when turned off].  We are going to boot the operating system from pen drive, so insert when the system is turned off.
Now Turn on the system.
Press F10 [boot menu, differs for system]  before booting and select boot from Pen drive. 
Now it will boot the Backtrack.
Select "Graphical User Interface "
Now wait for a while ( it will execute some commands}
Now you can see the "root:"
type "startx" and hit enter.  It will bring you to the GUI view of Backtrack.

Step 2:Copy the SAM and System files
Click the  Start button(dragon symbol)
Select System Menu
Select Storage Media(if you see nothing, close the window open it again).

You can see the list of Hard disk and Your pen drive.
Open the windows installed Hard disk and Navigate to this path:

There you can see two files named as "SAM" and "System". 

Copy the both SAM and system files .
[ Just proceed to next step without closing the window]

Create a new folder in the desktop and paste the files inside.

Step 4: Run OphCrack Tool in Backtrack
Open the ophcrack GUI(start->Backtrack->Privilege Escalation->Password Attack->offline Attacks-ophCrack GUI).

Step 5: Loading the folder that contains sam and system files

Click the Load and select "Encrypted SAM" in ophcrack tool.
Now it will ask you to select directory that contains SAM folder. Select the directory where you saved the SAM file.

Now it will load and display the list of user accounts in the windows.

Step 6: Target the Admin Account
Here i am going to hack the one of the administrator account of my computer. So remove all other accounts except the target admin account.

Step 7: The Rainbow Table

Extract the "" file in the desktop.

Click the Table button in ophcrack tool. Now it will ask you to selec the table.  Select the "XP free fast" and click the install button. Now browse to the Rain bow table directory "tables_xp_free_fast"
Now click ok.

Step 8: Cracking Begins
Click the Crack button.
Wait for a while [ophcrack is the fastest cracking tool. so it won't take too much time]

Step 9: Password is cracked
Yes..!! we got the password.

Don't forget to share with your friends.

Screen shots :
Screen shots windows Admin Password Cracking

Continue   Reading>>

How to Crack Windows Accounts Example Screenshots Tutorial

Hi Break The Security hackers, this is just screen shot.  The Detailed Text version tutorial can be found in this link:
How to hack Windows accounts Password with Ophcrack?

I have separated it into two parts because of too large number of Screen shots. 

Continue   Reading>>

Thursday, June 2, 2011

How to Launch the Password Cracker 1.1 Application?

Recently i have developed a simple password cracking tool and released as open source software.  Today let us see how to launch PasswordCracker 1.1(HashCodeCracker 1.1). 

How to use Password Cracker? 

Minimum Requirements:
JRE(Java run time Environment) 1.6 should be installed .

Continue   Reading>>

Wednesday, June 1, 2011

Password Cracker Open Source Software Created by BreakTheSecurity

Hi Break The Security's Hackers, i have created Password Cracking Tool.  I have released it as open source software in

This tool uses Dictionary Attack method to crack the MD5, SHA-1,MD4,SHA-128,256,512 hash codes.  Now it is simple and basic tool.  In future it will become more efficient tool.

Continue   Reading>>

Wednesday, April 27, 2011

How to Crack MD5 Using Cain and abel tools-Brute Force Attack

Hi Hackers, hope you like the tutorials from BTS(Break The Security). Last time i have introduced a cain&abel cracking tool(read for more details "Introduction to Cain and Abel cracking tool").  Now i am going to explain how to use the cain and abel tools for cracking MD5 passwords(Using Brute Force method).
To know about Brute Force Attack read this Post: Introduction to Brute Force attack cracking
Cracking Password Step 1:
Open the cain &abel tool
You can see the different types of tabs.  we are going to crack the passwords ,right?! then why are you waiting ? click the Cracker tab

Continue   Reading>>

Tuesday, April 26, 2011

What is Brute Force Cracking Attack?|Cracking HASH passwords

Hi friends, If you don't know about cracking encrypted or ciphered data using Brute Force attack,this article will help you to gain much knowledge about the Brute Force attack.  

What is Brute Force attack?
     Brute force attack is one of the password cracking method. In this method we are not decrypting the passwords.  Instead  we are trying to crack the password by comparing different combination of characters (all  possible keys) with hash code. 

Continue   Reading>>

Monday, March 7, 2011

How to see the remembered passwords | passwords autofill Cracked

I am going to teach you how to see the passwords which are shown as astersik characters(*).

What is the use?

if your friend/lover select the remember passwords option when login,then you got the chance to hack their password without much effort(no need of phishing ).

Two cases:

Case I: 
if they select remember password in mozilla popup. It is easy to see the password using this method:How to see the saved passwords in mozilla?

Second I:
If the select remember passwords in login form , here is the another method.

How to see the remembered passwords ?
 Whenever someone select remember password in login form,the passwords will be automatically filled.  But the problem is that we can login but can not see the password.  Because the password will be shown as "astersik characters"(*).  Her e is the trick to crack that also.

Visit any site which remembers passwords and show astersik characters in password box.

Copy the following code
javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
Paste in the address bar.
Press enter key
Now the hidden password behind the astersik character will be shown.

Tutorial With Example Picture:
Lets take the
if the password is auto filled as shown in the picture, then this method will work for you.

Continue   Reading>>

Saturday, February 12, 2011

How to Auto Save Passwords Without Notification in IE

This brief tutorial will show you how to save your passwords and username automatically, without this annoying notification!

1. Click Tools.
2. Click Internet Options.
3. Select the Content tab.
4. Under the Autocomplete section, click Settings.
5. At this point, the Auto Complete settings Dialog box will popup. Untick the Prompt me to save passwords check box.
6. Click OK to save.
Continue   Reading>>

Tuesday, December 21, 2010

A small Collection of Password Cracking Tools 2010

Using these tools you can hack like Windows Admin password, pdf passwords, zip files passwords, document passwords, rar passwords,etc..

 This Password Hacking Kit Consists of following Password Hacking Breaking Tools:
  1. PDF Password Remover
  2. Windows XP Admin Password Remover
Continue   Reading>>

Saturday, December 18, 2010

Access Data of a Password Protected User in Windows XP when fails to Boot

You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won't be able to access them from outside, so here is a method for getting around this.

Continue   Reading>>

Tuesday, December 7, 2010

What is Your Password ? How the Password should be?

What is your password ? is your password like 123456, 98654, billgates,yourname,lovername,iloveyou,thankyou?  Then you will definitely  loose your account soon.  The hackers can easily hack your account with much effort.
Continue   Reading>>
Older Post Home

© Break The Security. Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com