SAMInside

SAMInside

Infobox_Software
name = SAMInside



caption = Screenshot of SAMInside with imported default Windows users
developer = InsidePro
latest_release_version = 2.6.3.0
latest_release_date = April 26, 2008
operating_system = Microsoft Windows
genre = Password recovery
license = Shareware
website = [http://www.insidepro.com/ www.insidepro.com]

SAMInside is a password recovery program for cracking lost Windows NT/2000/XP/2003 users' LM or NTLM hashed passwords. It can crack passwords at 10 million passwords per second on a good computer. fact|date=September 2008 This is the result of core parts written in assembly language. It also has multi language support and it's translated into five languages.fact|date=September 2008

Features

This program is the first program that started to work with passwords encrypted with "syskey", it supports about 10 types of importing, 4 types of exporting hashes and (currently) 6 types of password attack:

* Mask attack
* Dictionary attack
* Hybrid attack
* Attack with Rainbow tables

Here are some key features of "SAMInside":

* "Import from SAM and SYSTEM registry files" - import hashes from SAM Windows registry file. If there's additional encryption by SYSKEY in the imported SAM file (it's on default enabled in Windows 2000/XP/2003), then the program will also need SYSTEM Windows registry file located at the same Windows directory there SAM file is - in the folder %SystemRoot%System32Config. Copies of these files may be also found in %SystemRoot%Repair and %SystemRoot%RepairRegBack folders. (Note: %SystemRoot% - is a system directory of OS Windows, usually folder C:WINDOWS or C:WINNT).
* "Import from SAM registry file and file with system key" - import encrypted passwords from SAM Windows registry file using file with system key SYSKEY.
* "Import from PWDUMP file" - import hashes from text file of PWDUMP program format. You can find test files with such hashes in the SAMInside program archive.
* "Import from *.LC file" - import hashes from files created by L0phtCrack program.
* "Import from *.LCP file" - import hashes from files created by LCP4/LCP5 programs.
* "Import from *.LCS file" - import hashes from files created by LC4/LC5 programs.
* "Import from *.HDT file" - import hashes from projects created by Proactive Windows Security Explorer program.
* "Import from *.LST file" - import hashes from the LMNT.LST file, created by Cain&Abel program.
* "Import from local machine ..." - import encoded passwords from the local machine (to do that launch the program with *Administrator user's rights). The program uses the following methods to get local hashes:

# " ... using LSASS" - import local hashes using connection to LSASS process.
# " ... using Scheduler" - import local hashes using system utility Scheduler

External links

* [http://www.insidepro.com/eng/saminside.shtml Official page]
* [http://forum.insidepro.com/index.php?c=1 Official forum]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …   Wikipedia

  • Ophcrack — Developer(s) Cedric Tissieres Philippe Oechslin Objectif Sécurité Stable release 3.3.1 / July 29, 2009; 2 years ago ( …   Wikipedia

  • Crack (software) — Crack Developer(s) Alec Muffett Stable release 5.0a / June, 2000 Operating system Unix Type password cracking …   Wikipedia

  • RainbowCrack — Тип взлом хешей Разработчик Zhu Shuanglei Операционная система Windows и Linux Последняя версия 1.5 (26 августа 2010) Сайт http://project rainbowcrack.com/ …   Википедия

  • John the Ripper — Тип Взлом паролей Разработчик Alexander Peslyak Написана на C, ассемблер[1] Операционная система Кроссплатформенное Последняя версия 1.7.9 jumbo 5 (18 дек …   Википедия

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”