Blogger Widgets

Saturday, May 5, 2012

Advanced Outlook Express Recovery




Recovers deleted or corrupt emails from outlook express .It can recover deleted items even
if they have been cleared from the deleted items folder . Can import DBX files or open
existing system DBX files to view emails ,simple to use interface. Keywork filter allows
you to filter large amount of results down to a more managable amount and the header
sorting allows to group email header items such as from ,to and subject. Does not use the
files indexes so produces better results than some of the more expensive rivals. Advanced
Outlook Express DBX.

Download Now

WinRar Password Remover - V2


WinRar Password Recovery is a powerful tool to recover lost/ forgotten passwords.
The program supports the Brute-Force attack, dictionary-based attack and dramatically
fastest Boost-Up attack.
This version is faster and more enhanced than the last version (V1.1), it also includes
many more features.



See Password 2.05


An easily applied retrieval tool for forgotten passwords.
BSEditor: When a password appears on screen as a series of asterisks or dots, you simply
view it through SeePassword's magnifying glass to reveal the actual password text.
SeePassword has no problems with passwords stored by Internet Explorer?all the sites
will yield their secrets.



ZIP Password Recovery Magic





ZIP Password Recovery Magic is an easy-to-use program that can help you to recover
lost passwords for zip archives. ZIP Password Recovery Magic provides brute-force and
dictionary recovery methods, you can pause and resume recovery job easily. ZIP
Password Recovery Magic has an easy to use interface. All you need to recover your
password is just to add your file to the operation window.

Download Now

Multi Password Recovery 1.1.4





Multi Password Recovery (MPR) - multifunctional password decryption, removal and
auditing solution for Windows. MPR instantly finds and recovers passwords from more
than 80 popular applications (FTP, E-mail clients, IM, Browsers and so on). It can also
delete stored passwords, shows passwords hidden under asterisks, copies SAM file and
can generate new passwords. Under W2K/XP/2K3 MPR is able to process blocked for
reading files.
Password Recover from:
FTP clients (Core FTP 2.x,FTP Commander Pro, FlashFXP 1.x-3.x, CuteFTP Home/Pro
WS_FTP 5, 6, 7, 8, 9)
E-mail Clients:
- Outlook Express 6.0
- Outlook 2000 (MSO 2000), 2002 (MSO XP), 2003 (MSO .NET)
- Mozilla Thunderbird 1.0, 1.5.x


Browsers:
- Opera 6.x, 7.x, 8.x, 9.x
- Mozilla Browser 1.7.x
- Internet Explorer 4, 5, 6, 7
- Mozilla Firefox (mostly all versions)
Download managers:
- Download Master 4, 5
- GetRight 5
- FlashGet (JetCar) 1.6, 1.71, 1.8
- Internet Download Accelerator 5
Internet
- QIP 2005
- Miranda IM 0.2.x, 0.3.x, 0.4.x, 0.5.x, 0.6
- ICQ 99b-2003b, Lite 4, Lite 5
- MSN Messenger 1.x-7.x
- Windows Messenger
- Yahoo! Messenger 3.x-6.x
- AOL Instant Messenger (older versions), 6.x
- AIM Pro
- GAIM 1.x
- IM2 (Messenger 2) 1.5.x
- SIM 0.9
- Google Talk (mostly all versions)
- PSI (mostly all versions)
- Faim 0.1
- Windows Live Messenger
- Gizmo Project (mostly all versions)

Download Now

PDF Password Remover 3.0


The PDF Password Remover is a useful and reliable software which can be used to
decrypt protected Adobe Acrobat PDF files, which have "owner" password set,
preventing the file from editing (changing), printing, selecting text and graphics.
Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g.
Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions
enabled. All versions of Adobe Acrobat (including 7.x, which features 128-bit
encryption) are supported.



How to hack Http, ftp, router Passwords?




A brute-force attack is nothing more than guessing a user ID/password combination.
use brute force attack tools like THC-Hydra, Brutus.


1.) THC-Hydra:
THC-Hydra is a remote dictionary attack tool from The Hacker's Choice group.
It's a well made tool that supports a lot of protocols and options. The following
protocols are supported: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB,
SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTPAUTH,
SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2,
LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA.

Download Now



2.) Brutus:
Brutus is one of the fastest, most flexible remote password crackers you can get your hands on -
it's also free. It is available for Windows 9x, NT and 2000, there is no UNIX version available
although it is a possibility at some point in the future. Brutus was first made publicly available in
October 1998 and since that time there have been at least 70,000 downloads and over 175,000
visitors to this page. Development continues so new releases will be available in the near future.
Brutus was written originally to help check routers etc. for default and common passwords.
Brutus version AET2 is the current release and includes the following authentication types :
HTTP (Basic Authentication)
HTTP (HTML Form/CGI)
POP3
FTP
SMB
Telnet
Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and
simply imported into your copy of Brutus. You can create your own types or use other peoples.
The current release includes the following functionality :
Multi-stage authentication engine
60 simultaneous target connections
No username, single username and multiple username modes

Password list, combo (user/password) list and configurable brute force modes
Highly customisable authentication sequences
Load and resume position
Import and Export custom authentication types as BAD files seamlessly
SOCKS proxy support for all authentication types
User and password list generation and manipulation functionality
HTML Form interpretation for HTML Form/CGI authentication types
Error handling and recovery capability inc. resume after crash/failure.


Download Now

Password Hacking through Sniffing




What is Sniffing?
Sniffing is another technique to use internally. A sniffer or packet capture utility is able to
capture any traffic travelling along the network segment to which it is connected. We
normally set up sniffers throughout the organization to capture network traffic, hoping to
identify valuable information such as user IDs and passwords. We use sniffing to
passively capture data being sent across the internal network. Laptops are usually the
ideal platform since they are portable and easy to conceal. The system does not even need
an IP address since it passively captures the traffic. The sniffing machine copies the data
without modifying its contents and is difficult to detect even with sophisticated intrusion
detection software. There are programs, such as AntiSniff, that have some success in
detecting sniffers.
Switched Ethernet environments reduce the risk of packet capture. Since the sniffer is
able to capture traffic only on its same network segment, a sniffer in a switched
environment can see only traffic destined for it. However, in a shared environment or
mixed environment, sniffers can be very useful for capturing valuable traffic. In addition,
dsniff, written by Dug Song, is able to sniff across switches. The techniques dsniff uses to
sniff on switched segments can cause denial-of-service conditions and therefore should
be used cautiously during penetration testing.

Top 4 Sniffers:
Ethreal
dsniff
Ettercap NG 0.7.1
Hunt 1.5