Encryption and Password Cracking Tools - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Encryption and Password Cracking Tools

Description:

THC Hydra: A Fast network authentication cracker which supports many different services. ... recovering wireless network keys, revealing password boxes, ... – PowerPoint PPT presentation

Number of Views:404
Avg rating:3.0/5.0
Slides: 12
Provided by: xav852
Category:

less

Transcript and Presenter's Notes

Title: Encryption and Password Cracking Tools


1
Encryption and Password Cracking Tools
2
Encryption Tools
  • Insecure.org went on a quest to find the best
    encryption tools available. They received over
    3000 responses from security experts around the
    world. The top 3 were
  • GnuPG/PGP Secure your files and communication
    w/advanced encryption.
  • OpenSSL The premier SSL/TLS encryption library.
  • Tor An anonymous Internet communication system.

3
Encryption Tools
  • GnuPG/PGP GnuPG is the GNU project's complete
    and free implementation of the OpenPGP standard
    as defined by RFC4880 . GnuPG allows to encrypt
    and sign your data and communication, features a
    versatile key managment system as well as access
    modules for all kind of public key directories.
    GnuPG, also known as GPG, is a command line tool
    with features for easy integration with other
    applications.

4
Encryption Tools
  • OpenSSL The OpenSSL Project is a collaborative
    effort to develop a robust, commercial-grade,
    full-featured, and Open Source toolkit
    implementing the Secure Sockets Layer (SSL v2/v3)
    and Transport Layer Security (TLS v1) protocols
    as well as a full-strength general purpose
    cryptography library. The project is managed by a
    worldwide community of volunteers that use the
    Internet to communicate, plan, and develop the
    OpenSSL toolkit and its related documentation.

5
Encryption Tools
  • Tor Tor is free software and an open network
    that helps you defend against a form of network
    surveillance that threatens personal freedom and
    privacy, confidential business activities and
    relationships, and state security known as
    traffic analysis.
  • Tor protects you by bouncing your communications
    around a distributed network of relays run by
    volunteers all around the world it prevents
    somebody watching your Internet connection from
    learning what sites you visit, and it prevents
    the sites you visit from learning your physical
    location. Tor works with many of your existing
    applications, including web browsers, instant
    messaging clients, remote login, and other
    applications based on the TCP protocol.

6
Password Cracking Tools
  • The top 3 password crackers were
  • Cain and Abel The top password recovery tool for
    Windows.
  • John the Ripper A powerful, flexible, and fast
    multi-platform password hash cracker.
  • THC Hydra A Fast network authentication cracker
    which supports many different services.

7
Password Cracking Tools
  • Cain Abel is a password recovery tool for
    Microsoft Operating Systems. It allows easy
    recovery of various kind of passwords by sniffing
    the network, cracking encrypted passwords using
    Dictionary, Brute-Force and Cryptanalysis
    attacks, recording VoIP conversations, decoding
    scrambled passwords, recovering wireless network
    keys, revealing password boxes, uncovering cached
    passwords and analyzing routing protocols. The
    program does not exploit any software
    vulnerabilities or bugs that could not be fixed
    with little effort. It covers some security
    aspects/weakness present in protocol's standards,
    authentication methods and caching mechanisms
    its main purpose is the simplified recovery of
    passwords and credentials from various sources,
    however it also ships some "non standard"
    utilities for Microsoft Windows users.

8
Password Cracking Tools
  • John the Ripper is free and Open Source
    software, distributed primarily in source code
    form. If you would rather use a commercial
    product tailored for your specific operating
    system, please consider John the Ripper Pro,
    which is distributed primarily in the form of
    "native" packages for the target operating
    systems and in general is meant to be easier to
    install and use while delivering optimal
    performance.

9
Password Cracker Tools
  • Hydra was a software project developed by a
    German organization called "The Hacker's Choice"
    (THC) that uses a dictionary attack to test for
    weak or simple passwords on one or many remote
    hosts running a variety of different services. It
    was designed as a proof-of-concept utility to
    demonstrate the ease of cracking poorly chosen
    passwords.

10
Encryption Vs. Password
Hydra Screen Shot
11
References
  • Background Photo
  • http//baninternational.net/images/computer_securi
    ty.jpg
  • http//www.gnupg.org/
  • http//sectools.org/crypto.html
  • http//sectools.org/crackers.html
  • http//www.torproject.org/
  • http//www.oxid.it/cain.html
  • http//www.openwall.com/john/
  • http//en.wikipedia.org/wiki/Hydra_(software)
  • http//freeworld.thc.org/thc-hydra/
Write a Comment
User Comments (0)
About PowerShow.com