PasswordsPro v3.1.0.0 + All Plugins {recovering passwords to hashes}

Discussion in 'Cracking Tools' started by P4NiSh3R, May 9, 2016.

  1. P4NiSh3R

    P4NiSh3R Active Member

    Messages:
    279
    Likes:
    3,660
    Ratio:
    2.82
    Program Description


    This program is designed for recovering passwords to hashes of the following types:
    Code:
    Select All
    – DES(Unix) – Domain Cached Credentials – ELF-32 – FCS-16 – FCS-32 – Fletcher-32 – FNV-32 – GHash-32-3 – GHash-32-5 – GOST R 34.11-94 – HAS-160 – Haval-128 – Haval-128(HMAC) – Haval-160 – Haval-160(HMAC) – Haval-192 – Haval-192(HMAC) – Haval-224 – Haval-224(HMAC) – Haval-256 – Haval-256(HMAC) – Lineage II C4 – MD2 – MD2(HMAC) – MD4 – MD4(HMAC) – MD5 – md5($pass.$salt) – md5($pass.$salt.$pass) – md5($pass.md5($pass)) – md5($salt.'-'.md5($pass)) – md5($salt.$pass) – md5($salt.$pass.$salt) – md5($salt.$pass.$username) – md5($salt.md5($pass)) – md5($salt.md5($pass).$salt) – md5($salt.MD5($pass).$username) – md5($salt.md5($pass.$salt)) – md5($salt.md5($salt.$pass)) – md5($salt.md5(md5($pass).$salt)) – md5($username.0.$pass) – md5($username.LF.$pass) – md5($username.md5($pass).$salt) – md5(3 x strtoupper(md5($pass))) – MD5(APR) – MD5(Cisco PIX) – MD5(Custom) – MD5(HMAC(Wordpress)) – MD5(HMAC) – md5(md5($pass)) – md5(md5($pass).$pass) – md5(md5($pass).$salt) – md5(md5($pass).md5($pass)) – md5(md5($pass).md5($salt)) – md5(md5($salt).$pass) – md5(md5($salt).md5($pass)) – md5(md5($username.$pass).$salt) – md5(md5(md5($pass))) – md5(md5(md5(md5($pass)))) – md5(md5(md5(md5(md5($pass))))) – MD5(phpBB3) – md5(sha1($pass)) – md5(sha1(md5($pass))) – md5(sha1(md5($pass)).sha1($pass)) – md5(sha1(md5(sha1($pass)))) – md5(strrev($pass)) – md5(strtoupper(md5($pass))) – MD5(Unix) – MD5(Wordpress) – MSSQL(2000) – MSSQL(2005) – MySQL – MySQL5 – NTLM – Palshop – RAdmin v2.x – RipeMD-128 – RipeMD-128(HMAC) – RipeMD-160 – RipeMD-160(HMAC) – RipeMD-256 – RipeMD-256(HMAC) – RipeMD-320 – RipeMD-320(HMAC) – SAPB – SAPG – SHA-1 – SHA-1(Django) – SHA-1(HMAC) – SHA-1(MaNGOS) – SHA-1(MaNGOS2) – SHA-1(Oracle) – SHA-224 – SHA-224(HMAC) – SHA-256 – SHA-256(Django) – SHA-256(HMAC) – SHA-256(PasswordSafe) – SHA-256(Unix) – SHA-384 – SHA-384(Django) – SHA-384(HMAC) – SHA-512 – SHA-512(Drupal) – SHA-512(HMAC) – SHA-512(Unix) – sha1($pass.$salt) – sha1($salt.$pass) – sha1($salt.$username.$pass.$salt) – sha1($salt.md5($pass)) – sha1($salt.md5($pass).$salt) – sha1($salt.sha1($pass)) – sha1($salt.sha1($salt.sha1($pass))) – sha1($username.$pass) – sha1($username.$pass.$salt) – sha1(md5($pass)) – sha1(md5($pass).$salt) – sha1(md5($pass).$userdate.$salt) – sha1(md5(sha1($pass))) – sha1(md5(sha1(md5($pass)))) – sha1(sha1($pass)) – sha1(sha1($pass).$salt) – sha1(sha1($pass).substr($pass,0,3)) – sha1(sha1($salt.$pass)) – sha1(sha1(sha1($pass))) – sha1(strtolower($username).$pass) – sha256($pass.$salt) – sha256($salt.$pass) – sha256(md5($pass)) – sha256(sha1($pass)) – sha384($pass.$salt) – sha384($salt.$pass) – sha512($pass.$salt) – sha512($salt.$pass) – Skein-1024 – Skein-1024(384) – Skein-1024(512) – Skein-256 – Skein-256(128) – Skein-256(160) – Skein-256(224) – Skein-512 – Skein-512(128) – Skein-512(160) – Skein-512(224) – Skein-512(256) – Skein-512(384) – Snefru-128 – Snefru-128(HMAC) – Snefru-256 – Snefru-256(HMAC) – SSHA-1 – strrev(md5($pass)) – strrev(md5(strrev(md5($pass)))) – substr(md5($pass),16,16) – substr(md5($pass),8,16) – Tiger-128 – Tiger-128(HMAC) – Tiger-160 – Tiger-160(HMAC) – Tiger-192 – Tiger-192(HMAC) – Ventrilo – Whirlpool – Whirlpool(Double) – Whirlpool(HMAC) – WPA-PSK PMK – XOR-32 – xsha1(strtolower($pass))

    Supported attack types:
    Code:
    Select All
    Preliminary Attack – this is a quick check of user hashes for matching to simple passwords like "123", "qwerty", "99999", etc., as well as to passwords found by the program earlier. Brute Force Attack – this is the exhaustive search through all possible passwords in a certain range; e.g., "aaaaaa"..."zzzzzz". Mask Attack – this attack is used when some information on the lost password is known. To use the attack, make sure to specify the mask for each character in the password to be recovered in the attack settings. For mask characters you can use the conventional characters for the standard or custom character sets – ?u, ?d, ?2, etc. (see the "Character Sets" tab in the program's settings). Simple Dictionary Attack – during this attack, the program simply checks hashes against passwords in dictionaries. Combined Dictionary Attack – during this attack, passwords are made of several words taken from different dictionaries. That allows to recover complex passwords like "superadmin", "admin*admin", etc. Hybrid Dictionary Attack – this attack allows modifying passwords taken from dictionaries (for example, shift the password to upper case, append '1' to the end of the password, etc.) and validating them as user passwords. The actions performed over source passwords are called "rules", and the full list of those is available in the file "Rules.txt" in the software distributive. Rainbow Attack – this attack attempts to recover passwords using the pre-calculated Rainbow tables.

    Hidden Content:
    You must 'reply' before you can see the hidden content.
     
    TMAN40, DEVIL KING, monoking and 11 others like this.
  2. cristianosky88

    cristianosky88 Basic Member

    Messages:
    158
    Likes:
    15
    Ratio:
    0
    Thnaks man nice wokr
     
  3. frax

    frax Banned Scammer

    Messages:
    591
    Likes:
    153
    Ratio:
    0.05
    thank for this share bro ;) cheers
     
  4. mikewaals

    mikewaals Member

    Messages:
    278
    Likes:
    14
    Ratio:
    0.01
    thanks man appreciate
     
  5. velociptor1982

    velociptor1982 Basic Member

    Messages:
    683
    Likes:
    240
    Ratio:
    0.07
    thanks dude ;)
     
  6. CharlieM

    CharlieM Basic Member

    Messages:
    101
    Likes:
    72
    Ratio:
    0.59
    Thanks for the share, I will use this to contribute better combos.
     
  7. GNeg

    GNeg New Member

    Messages:
    12
    Likes:
    0
    Ratio:
    0
    Keep it up mate! was looking for something like this !
     
  8. crux

    crux Banned

    Messages:
    246
    Likes:
    218
    Ratio:
    0.11
    Thnaks man nice wokr
     
  9. ahm3d

    ahm3d Basic Member

    Messages:
    118
    Likes:
    154
    Ratio:
    0.51
    great work :)
     
  10. bullgamingyt

    bullgamingyt Member

    Messages:
    33
    Likes:
    3
    Ratio:
    0
    Great Work buddy
     
  11. zoufat

    zoufat Member

    Messages:
    54
    Likes:
    2
    Ratio:
    0
    thank you let's try this
     
  12. monoking

    monoking Banned

    Messages:
    39
    Likes:
    2
    Ratio:
    0
    great share
     
  13. gobar

    gobar Basic Member

    Messages:
    247
    Likes:
    45
    Ratio:
    0.03
    thanks for share
     
  14. DEVIL KING

    DEVIL KING Advanced Member

    Messages:
    267
    Likes:
    209
    Ratio:
    1.74
    Good stuff mate, thank you for sharing!
     
  15. TMAN40

    TMAN40 New Member

    Messages:
    2
    Likes:
    0
    Ratio:
    0
    thanks would love to try!!!!!!!!!!!!!!!!!!!!
     

Share This Page