Cain and Abel Password Cracker is an easy and powerful software for cracking any kind of password or security code. It supports different kinds of software and hardware, it has a strong encryption, it tries the first letter or word of the password, if it works it doesn’t restart, it works on Windows and Linux. This password cracker software is simple in use, you just need to install and run it and then select your target text and press start, when the cracking process starts, you will see the result of your password, so you can decide if the password is strong enough to crack
What do you use and why?
Cain is used by network administrators and security auditors to monitor traffic, see where users are browsing, capture data packets to verify their susceptibility and test the robustness of the network’s security structure.
Cain is also used by script kiddies all over the world, because it allows you to discover paths hidden by asterisks, capture common logins and probe the network, as well as capture calls via VoIP.
Characteristics of Cain
Cain Abel is a database recovery tool for Microsoft Operating Systems. It allows easy retrieval of various types of signals through network sniffer, password decryption using dictionary, brute force and cryptanalysis attack, recording of conversations via VoIP, decryption of encrypted signals, display of password boxes (hidden by asterisks), recovery of cached paths and analysis of rooted protocols.
Other features and applications of Cain Abel follow below:
Protected Storage Password Manager
Reveals locally stored passwords from Outlook, Outlook Express, Outlook Express Identities, Outlook 2002, Internet Explorer and MSN Explorer.
Credential Manager Password Decoder
Reveals stored paths not Local Credential Sets of Windows XP/2003.
LSA Secrets Dumper
Retrieves the contents of the Local Security Authority Secrets.
Dialup Password Decoder
Reveals paths stored by the “Dial-Up Networking” component of Windows.
APR (ARP Poison Routing)
Enables or sniffing in networks with switch and Man-in-the-Middle attacks.
Route Table Manager
It provides the same functionalities as the Windows router.exe tool with a graphical interface.
Extract names of users associated with Security Identifiers (SIDs) on a remote system.
It recovers, when possible, the logins, groups, shares and services executed on a machine.
Allows you to stop, start, pause/continue or remove a service.
Captures signals, hashs and authentication information as it is being transmitted over the network. Included several filters for authentication in specific applications and rooted protocols. The VoIP filter enables the capture of conversations transmitted with the SIP/RTP protocol, saving later as .wav files.
Routing Protocol Monitors
Monitors vintage messages from various rotated protocols to capture authenticated shared rotation tables.
Full RDP sessions sniffer for APR (APR-RDP)
It allows capturing all the data sent in a Remote Desktop Protocol (RDP) session in a network. Possibility to intercept keys typed from the client.
Full SSH-1 sessions sniffer for APR (APR-SSH-1)
It allows capturing all the data sent in an SSH session in a network.
Full HTTPS sessions sniffer for APR (APR-HTTPS)
It allows capturing all the data sent in an HTTPS session on a network.
Collect digital certificates from an HTTPS website and prepare them to be used by ARP-HTTPS.
MAC Address Scanner with OUI fingerprint
Using OUI fingerprint, make requests for information about what type of device or MAC address you see.
Promiscuous-mode Scanner based on ARP packets
Identifies sniffers and Intrusion Detection Systems (IDS) present in a local network.
It can scan by signal of wireless networks within a certain range, returning details about its MAC address, last time it was accessed, manufacturer, signal strength, or network name (SSID), WEP encryption is possui or not (networks with encryption WEP is displayed as WEPed), it is connected to an Ad-Hoc or Infrastructure network, which channel it is operating on and at the network speed (ex: 11Mbps).
Access (9x/2000/XP) Database Passwords Decoder
Decodes encrypted passwords stored by Microsoft Access database.
Base64 Password Decoder
Decode Base64 encoded strings.
Cisco Type-7 Password Decoder
Decodes Cisco Type-7 signals used in router and switch configuration files.
Cisco VPN Client Password Decoder
Decodes Cisco VPN Client signals stored in connection configuration files (*.pcf).
VNC Password Decoder
Decodes encrypted VNC signals from the registry.
Enterprise Manager Password Decoder
Decodes senes used by Microsoft SQL Server Enterprise Manager (supported by SQL 7.0 and 2000).
Remote Desktop Password Decoder
Decodes non-Remote Desktop Profiles files (.RPD files).
PWL Cached Password Decoder
It allows you to view all cached resources and related signals in plain text, or from path list files.
It makes it possible to recover plain text streams encrypted using various hashs or cryptographic algorithms. All crackers support dictionary and brute force attacks.
It allows cracking passwords using the Faster Cryptanalytic time memory trade off technique created by Philippe Oechslin. This cracking technique uses a set of pre-computed encrypted signal tables, called Rainbow Tables, to optimize the method and increase the speed of recovering plain text signals.
It allows cracking signals by means of the great power of this online cracking service based on Rainbow Table technology.
NT Hash Dumper Password History Hashes (works with Syskey enabled)
Retrieves the hash of network signals from the SAM file with Syskey enabled or not.
Recovers Boot Key used by Syskey from local registry or offline system files.
MSCACHE Hashes Dumper
Retrieves the hash of the stored MSCACHE address in the local registry.
Wireless Zero Configuration Password Dumper
Recover the wireless key stored by Windows Wireless Configuration Service.
Microsoft SQL Server 2000 Password Extractor via ODBC
Connect to a SQL server via ODBC and extract all the users and signals from the master database.
Oracle Password Extractor via ODBC
Connect to an Oracle server via ODBC and extract all the users and signals from the master database.
MySQL Password Extractor via ODBC
Connect to a MYSQL server via ODBC and extract all the users and signals from the master database.
Displays paths hidden by asterisks in path dialog boxes.
RSA SECURITY Token Calculator
It can calculate the RSA key given by .ASC files of tokens.
Output or hash value of a given file.
Displays the state of the local ports (such as netstat).