Friday, June 10, 2016

UNIX/Linux crypto algorithms: crypt()
UNIX/Linux encryption weakness: short key length, human factor
Possible attacks against UNIX/Linux: exhaustive key search / brute force, dictionary
Attacks complexity: 252



http://www.password-crackers.com/en/category_127/
Sort by
John The Ripper 1.7 +++
(13817 downloads)
by Solar Designer
Pentium 4 rate: not tested
Core 2 Duo rate: not tested
AMD rate : not tested
CUDA rate : N/A
Optimized for P2,P3; P4; AMD

Recommended

Free (GPL) Price:  $0.00
Description: A command-line portable utility, optimized for a lot of processors. Its primary purpose is to detect weak Unix passwords. Also supports non-standard crypt() functions, additionaly supports Windows NT LanManager hash.

Elcomsoft Distributed Password Recovery 2.71 +++
(29492 downloads)
by ElcomSoft Co.Ltd.
Pentium 4 rate: not tested
Core 2 Duo rate: not tested
AMD rate : not tested
CUDA rate : N/A
Optimized for Pentium II/III; Pentium 4; AMD; NVIDIA GPU


Shareware Price:  $599.00 buy!
Description: High-performance distributed password recovery for forensic and government agencies, password recovery and data recovery services and corporations. Recover the most complex passwords and strong encryption keys in realistic timeframes. Accelerate the recovery by offloading calculations to NVIDIA GPUs and scale to over 10,000 workstations with zero scalability overhead.

No comments: