UNIX/Linux crypto algorithms: crypt()
UNIX/Linux encryption weakness: short key length, human factor
Possible attacks against UNIX/Linux: exhaustive key search / brute force, dictionary
Attacks complexity: 252
http://www.password-crackers.com/en/category_127/
UNIX/Linux encryption weakness: short key length, human factor
Possible attacks against UNIX/Linux: exhaustive key search / brute force, dictionary
Attacks complexity: 252
http://www.password-crackers.com/en/category_127/
Description: A
command-line portable utility, optimized for a lot of processors. Its
primary purpose is to detect weak Unix passwords. Also supports
non-standard crypt() functions, additionaly supports Windows NT
LanManager hash.
|
Description:
High-performance distributed password recovery for forensic and
government agencies, password recovery and data recovery services and
corporations. Recover the most complex passwords and strong encryption
keys in realistic timeframes. Accelerate the recovery by offloading
calculations to NVIDIA GPUs and scale to over 10,000 workstations with
zero scalability overhead.
|
No comments:
Post a Comment