Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ophcrack-cli(1) [debian man page]

OPHCRACK(1)							   User Commands						       OPHCRACK(1)

NAME
Ophcrack - a Microsoft Windows password cracker using rainbow tables. DESCRIPTION
Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds. Ophcrack works for Windows NT/2000/XP/Vista. Ophcrack can be used with command line using the options below, or can be run as a pure graphical software. If you have installed ophrack-cli package, graphical interface is not available. SYNOPSIS
ophcrack [options] OPTIONS
-a disable audit mode (default) -A enable audit mode -b disable bruteforce -B enable bruteforce (default) -c <file> specify the config file to use -D display (lots of!) debugging information -d <dir> specify tables base directory -e do not display empty passwords -f <file> load hashes from the specified file (pwdump or session) -g disable GUI -h display this information -i hide usernames -I show usernames (default) -l <file> log all output to the specified file -n <num> specify the number of threads to use -o <file> write cracking output to file in pwdump format -q quiet mode -r launch the cracking when ophcrack starts (GUI only) -s disable session auto-saving -S <session_file> specify the file to use to automatically save the progress of the search -u display statistics when cracking ends -t table1[,a[,b,...]][:table2[,a[,b,...]]] specify which table to use in the directory given by -d -v verbose -w <dir> load hashes from encrypted SAM file in directory dir -x export data in CSV format to the file specified by -o EXAMPLES
ophcrack -g -d /path/to/tables -t xp_free_fast,0,3:vista_free -f in.txt Launch ophcrack in command line using tables 0 and 3 in /path/to/tables/xp_free_fast and all tables in /path/to/tables/vista_free and cracks hashes from pwdump file in.txt SEE ALSO
Homepage: http://ophcrack.sourceforge.net/ Free rainbow tables: http://ophcrack.sourceforge.net/tables.php AUTHOR
This manual page was written by Adam Cecile <gandalf@le-vert.net> for the Debian system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL. 3.2.0 March 2009 OPHCRACK(1)

Check Out this Related Man Page

PSK-CRACK(1)						      General Commands Manual						      PSK-CRACK(1)

NAME
psk-crack - Crack IKE Aggressive Mode Pre-Shared Keys SYNOPSIS
psk-crack [options] <psk-parameters-file> <psk-parameters-file> is a file containing the parameters for the pre-shared key cracking process in the format generated by ike-scan with the --pskcrack (-P) option. This file can contain one or more entries. For multiple entries, each one must be on a separate line. The program can crack either MD5 or SHA1-based hashes. The type of hash is automatically determined from the length of the hash (16 bytes for MD5 or 20 bytes for SHA1). Each entry in the <psk-parameters-file> is handled separately, so it is possible to crack a mixture of MD5 and SHA1 hashes. psk-crack can also crack the proprietary hash format used by Nortel Contivity / VPN Router systems. When cracking Nortel format hashes, you need to specify the username of the hash that you are cracking with the --norteluser (-u) option. When cracking Nortel format hashes, you can only crack one hash at a time. By default, psk-crack will perform dictionary cracking using the default dictionary. The dictionary can be changed with the --dictionary (-d) option, or brute-force cracking can be selected with the --bruteforce (-B) option. DESCRIPTION
psk-crack attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option. psk-crack can operate in two different modes: 1) Dictionary cracking mode: this is the default mode in which psk-crack tries each candidate word from the dictionary file in turn until it finds a match, or all the words in the dictionary have been tried. 2) Brute-force cracking mode: in this mode, psk-crack tries all possible combinations of a specified character set up to a given length. OPTIONS
--help or -h Display this usage message and exit. --version or -V Display program version and exit. --verbose or -v Display verbose progress messages. --dictionary=<f> or -d <f> Set dictionary file to <f>. The default is /usr/local/share/ike-scan/psk-crack-dictionary. --norteluser=<u> or -u <u> Specify the username for Nortel Contivity cracking. This option is required when cracking pre-shared keys on Nortel Contivity / VPN Router systems. These systems use a proprietary method to calculate the hash that includes the username. This option is only needed when cracking Nortel format hashes, and should not be used for standard format hashes. --bruteforce=<n> or -B <n> Select bruteforce cracking up to <n> characters. --charset=<s> or -c <s> Set bruteforce character set to <s> Default is "0123456789abcdefghijklmnopqrstuvwxyz" AUTHOR
Roy Hills <Roy.Hills@nta-monitor.com> February 14, 2005 PSK-CRACK(1)
Man Page