Cain & Abel

Cain & Abel
Description :
Cain & Abel is a password recovery application for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.
Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons.
The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms.

The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Link :
http://www.ziddu.com/download/3280272/cainabelsniffing.part1.rar.html
http://www.ziddu.com/download/3280272/cainabelsniffing.part2.rar.html
http://www.ziddu.com/download/3280272/cainabelsniffing.part3.rar.html
http://www.ziddu.com/download/3280272/cainabelsniffing.part4.rar.html
http://www.ziddu.com/download/3280272/cainabelsniffing.part5.rar.html
http://www.ziddu.com/download/3280272/cainabelsniffing.part6.rar.html
http://www.ziddu.com/download/3280272/cainabelsniffing.part7.rar.html
Read more →

Tools WLAN

Modern wireless networking products are inexpensive, simple to set up and very convenient. They are also full of holes... security holes, that is.

The reason for this can be traced to the popularity of wireless. Wireless networking is firmly entrenched in the home computer market, and that means that the people buying the products cannot be assumed to have any form of expertise in IT; hence, the products had better be extremely easy to set up, and use.

Ease of use and security tend to be mutually exclusive. So for wireless manufacturers, the reasoning goes that while the average Joe or Jane Smith at home has nothing they'd really care to hide from the world, or that the world would really care to find out about them, they will get very peeved if they cannot get their new wireless router up and running quickly and without help.
Unfortunately, the only way to make a complicated appliance like a wireless router idiot proof is to use default settings that will not require the user to change a single settings on any of their other wireless hardware. By extension, this means that any wireless device can connect to said router using default settings.

To repeat, this means that ANY wireless device in range can connect to the Smith's new router. Now, if you are Joe Smith, do you have anything you'd like to hide?

PCSTATS
Tools that can discover wireless networks
- Netstumbler
- Kismet

Linux-based tools/info for cracking WEP Encryption
- Airsnort
- WEPcrack
- Wepattack

Tools that can capture wireless packets
- LinkFerret
- Etheral
- Kismet

There are a couple of reasons why wireless networks are currently less secure than their wired counterparts. First off, there is the fact of their physical nature. They are wireless, broadcasting a signal out over an area. Any computer within this area with the correct equipment can be considered to be 'connected' to the network.

No wires equal easier access to the network for everyone. This also makes one of the most popular 'hacking' tactics vastly easier: 'packet sniffing,' or capturing data sent over the network to analyze it for information. Anyone in range can receive all traffic sent over the wireless network.

Secondly, current security methods for the most widely available wireless technology, 802.11b, are either easy to defeat or difficult to implement.

The two most common methods of securing 802.11b networks are WEP (wireless encryption protocol) and MAC address filtering. WEP (64-bit, or 128-bit) protects wireless traffic by using a key to encrypt data, shared between all computers that need access. WPA (WiFi protected access) which is just now emerging, address all of WEPs shortcomings, and so we'll touch on that a little later on in the guide.

Unfortunately, WEP is rather easy to crack with the correct (and freely available) software, and its wireless nature makes it easy for intruders to capture enough of your encrypted traffic to give the cracking software something to work with.

Read more →
 
 
Copyright © Free PC Software
Designs By Bhambank Mbambong Blog