Javascript MD5/SHA1/SHA256/SHA512 Cracker
JavaScript Distributed Computing System is online. Cracks MD5,SHA1,SHA256 & SHA512 hashes in pure JavaScript
http://www.andlabs.org/tools/ravan.html
JavaScript Distributed Computing System is online. Cracks MD5,SHA1,SHA256 & SHA512 hashes in pure JavaScript
http://www.andlabs.org/tools/ravan.html
Most Apple applications store the Login passwords and critical information to prevent hassle of entering the password every time by the user. Often these applications use their own proprietary encryption mechanism to store the credentials. But on Mac many applications use the Keychain files for storing the username,passwords and sometime even other critical data. In such cases KeychainRecovery helps in recovering the lost master password of the Keychain file.
You can download it from securityxploded.com , the same site that brought you the Firefox Master password cracker.
According to Elcomsoft, a weakness in the way BlackBerry has implemented the apparently secure 256-bit AES encryption in its PC and Mac backup program BlackBerry Desktop Software makes it possible to carry out a successful password recovery attack on the backup archive with relative ease. Using systems running an Intel Core i7 CPU, they were able to break the 7-character unlock codes required to decrypt the files created by RIM’s BlackBerry Desktop software in about 30 minutes.
More: blog.crackpassword.com
Passware Inc. says it has come up with a way to access files on USB drives secured by the BitLocker encryption feature of Microsoft Windows.
They announced this week the release of Passware Kit Forensic version 10.1. The vendor said its software now lets investigators recover BitLocker encryption keys and getting “full access” to the contents of encrypted disks.
Microsoft added its BitLocker hard-disk encryption feature to the “ultimate” and “enterprise” versions of its Windows Vista and Windows 7 operating systems, in response to greater concern over data losses and breaches. It is also present in Windows Server 2008 and Windows Server 2008 R2.
Passware’s target market is law enforcement, said the company’s marketing manager, Nataly Koukoushkina.
She added users need physical access to computers in order to use Passware to defeat BitLocker encryption.
“That’s not easy for hackers,” she said. “We developed it for investigative purposes only.”
Passware launched the tool at the a training conference held by the High Technology Crime Investigation Association (HTCIA) in Atlanta.
The software costs US$795 and includes a year of free updates, Koukoushkina said, adding the BitLocker feature of Windows stores the encryption keys in a computer’s memory.
“We are using this vulnerability in order to decrypt the BitLocker hard disk,” she said. “Now the enhancement is for portable disk USB drives.”
Passware, who says its customers include the U.S. Department of Defense, makes software designed to either recover or reset software for a variety of document types, including Adobe Acrobat, plus Microsoft Word, Excel and Access.
The enterprise version will scan machines for password-protected files and scan the physical memory image file for disks encrypted with either BitLocker or TrueCrypt. If a TrueCrypt volume is dismounted, then the Passware software does a brute force attack.
Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behavior based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.
Ncrack’s features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap’s and many more.
Ncrack can now crack the Remote Desktop Protocol on all Windows versions from XP and above, with the introduction of the RDP module. Users are advised to read http://seclists.org/nmap-dev/2010/q3/450 for cracking Windows XP machines since they can’t handle many concurrent RDP connections.
Download and more info: http://nmap.org/ncrack/
We are now offering BIOS password recovery for HP/Compaq Mini netbooks.
How it works: Enter 3 incorrect passwords, after the third attempt you will be given a 10 character error code (ex: CNU92347K21)

This is the code you need to send along with your laptop model. If you have any questions please emails us before sending payment.
Russian password cracking software vendor ElcomSoft has recently released a tool which purportedly recovers the passwords stored on the latest iPhone’s without having to modify any data on the phone at all. The “iPhone Password Breaker” software works by recovering the password used to encrypt the keychain which the device uses to store the passwords for email accounts, websites, and software on the phone.
The software, which is aimed at Forensic Investigators, extracts the password from the keychain once it has been backed up to a computer. ElcomSoft has a variety of similar software that works with other file formats and platforms, such as ZIP and RAR file password crackers, Excel and Word, and a number of others. In the words of ElcomSoft:
ElcomSoft is world’s first to unlock access to iPhone keychains. Prior to the release of the updated iPhone Password Breaker, the keychains were considered impossible to obtain. The ability to recover stored passwords without altering the phone’s content offers valuable court evidence to investigators and forensic authorities.
On previous versions of the iPhones, the keychains remained encrypted with a hardware-specific device key which was unique to each iPhone, even when exported to an external backup, however, since the release of iOS 4, this is no longer necessarily the case, as they can now be stored in backups that are encrypted only with the backup’s master password. If this password is known, it is possible to gain access to these encrypted keychains. If an unencrypted backup is made, though, the keychains are still protected with the phones hardware key, and therefore, to gain access to the keychains, a password-protected backup must first be made (seems counter-intuitive doesn’t it?).
The ElcomSoft iPhone Password Breaker also employs GPU Password Cracking technology to significantly increase the speed of recovery. A trial can be obtained at http://iphone.elcomsoft.com
WPA Cracker is a WiFi security compromiser in the cloud, running on a high-performance cluster. Send them a dump of captured network traffic and $35, and they will try 136 million passwords in 40 minutes, tops (for $17, they’ll run the same attack at half speed) — the same crack would take five days on a “contemporary desktop PC.” They also have an extended, 284 million word dictionary that you can run for $55 in 40 minutes. They’ll also use the same process to crack the passwords on encrypted ZIP archives.
At Defcon 2010 on Thursday, at a specified time, KoreLogic will release a file containing 53,000 password hashes. The file will contain passwords of varying types (such as SHA, SSHA, MD5, DES, Lanman, NTLM, etc.) and will range from being “easy” to extremely difficult to crack. The password file is not simply 53,000 randomly generated passwords which would favor the person or group with the most GPU/CPU bruteforcing horsepower. Instead, the password file contains passwords based on what we believe are challenging patterns. Passwords will be of varying lengths, patterns, and complexity. Creative password cracking techniques, rules, dictionaries, and tools will be needed. The teams who are smart about the methods they use (i.e., teams who can crack more, with less work) will most likely be the most successful.
KoreLogic will be giving away the following prizes for first, second, and third place:
More Info: http://www.korelogic.com/defcon_2010-contest.html
WhatsMyPass now introducing BIOS Password Recovery Services!!!
We can recover Dell (2A7B, 595B, A95B or D35B service tag), Sony VAIO PCG & VGN models, Samsung,Fujitsu-Siemens, Hewlett-Packard, Compaq, Phoenix BIOS. You will receive the password within a few hours, sometimes almost instantly. The price is only $10 per password recovered, if we can’t recover it, you get your money back.
For more info and a list of supported computer models visit here:
BIOS Password Recovery Service
In order to serve you better when purchasing this service, if possible please enter the challenge/response hash with order. If you don’t know how to get the challenge hash, please email us first.