According to the official website, Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
The latest version is faster and contains a lot of new features like APR (ARP Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.
There are many tools that create a rainbow table and there are many rainbow tables already available on the internet.Fortunately, Cain comes with a tool called winrtgen, which is located in its own folder in the installation.
You probably know the most polymorphic and sadistic virus of this ending century, the so-called "30th day virus". It attacks the best sharewares as well as the worst ones, introducing as soon as you install them a bug that prevents them from running beyond a random delay, often 30 days. Cracklock has the leadership in the fighting challenge against this virus that even McAfee, Norton, Sophos, Thunderbyte and F-Proot seem unable to deal with.
It is now possible to run Cracklock from a usb flashdisk. In this mode, the settings are saved on disk in a Cracklock.settings file. By default this file is stored along with cracklock binaries. An option let you tell cracklock to save the settings in the current user's Appdata folder or in the Windows registry.
Another option can be set to store the per-application settings in each application's directory. If you run an executable file called "App.exe" that is (statically or run-time) injected by Cracklock and if there exists an associated configuration file called "App.exe.cracklock" next to it in the application directory then Cracklock will load the settings from that file instead of the general cracklock setting storage (the registry or the main setting file).
Cracklock controls a list of programs you set up. When a program from this list needs time or date, Cracklock operates, bluffing the calling program and returning the pre-determined date or time you have set. So, the program "thinks" to be at the date/time it accepts for running.
The Manager lets you add and configure application to be controlled by Cracklock. It lets you do the following 3 basic functions: adding a new application, configure the date and time parameters for an application, and execute the program (though it is not required to launch your applications from the manager).
To add an application to the list of applications controled by Cracklock, click twice on the Add program and then select the executable file of your application. A dialog box will show up to let you configure the parameters for this application.
You can restrict Cracklock to only affect the time, the date or both by selection the approriate raddio button. For instance if you choose to alter the time only then the program will run with the system date but with a fake time. If you choose "date and time" then both will be faked by Cracklock.
You can configure application for Cracklock directly from the Windows Explorer without having to use the Manager. In Windows Explorer, open the directory containing the executable file of your program.
If you want to enable Cracklock for this program, check the box Cure this program with Cracklock. Check Show advanced options to show the tabs from the configuration dialog box from the manager.
The drawback of this method is that all programs running simultaneously are affected together, Cracklock in its native method being precisely designed to affect specific date and time to each program running at one given moment and to avoid this inconvenience.
This option reproduces what you can do yourself manually without Cracklock, with the "date" or "time" commands under MS/DOS or with the configuration panel under Windows. In my mind, it has no real benefit.
With static-injection, Cracklock will alter the executable file of your application in order to make it load Cracklock. You can additionally tell Cracklock which file it should modify by selecting an executable file among the list of dependencies of your application.The license that you signed when you install a software often prevents you from modifying its executable files - even for the purpose of correcting a bug, as in the present case - so if you have signed such a license then you must not use static injection.
Using the run-time injection, Cracklock does not modify any executable file from your application, everything happens at run-time. Note that in this case you need to make sure that the system-wide injection is activated otherwise you will have to start the program from a special shortcut or from wihtin the manager.
To execute a program under the control of Cracklock, you can either run it as usual from the shortcut in the "Start" menu, or selecting the program in the manager and clicking on the Execute menu.
where "C:\PROGRAM FILES\Cracklock\MCL.EXE" is the full path to the MCL.EXE file installed in the Cracklock directory, C:\APP\APP.EXE is the full path to the executable .EXE file of your program, and [program_parameters] are the optional parameters required by your program.
Cracklock comes with two example applications showing the system date/time. To check that Cracklock works correctly, you can try to configure these two examples in the Manager. These two aplications are located in the "Examples" subfolder of the Cracklock directory.
I assume no responsibility for any use nor effects subsequent to the use of Cracklock. Crackclock is not intended for illegal uses. Users only are responsible of the usage they make of Cracklock. In particular, it is their responsibility to pay for the licence of the software runned under the control of Cracklock.
I thank all of the persons who have contributed to Cracklock: My Dad, Dominique Blum for the english version of the documentation and for his spell-check in the french documentation, my family (Dominique, Bianca, Éric et Gwen) for their constant support, Ernesto Pérez Estévez for the Spanish version of Cracklock and its documentation. Tarik Kallida for the Arabic version of Cracklock and its short documentation and Svetislav Orlovic for the Croatian version of Cracklock.
Important bug fixed: Cracklock did not work in parts of the world where no daylight saving scheme is implemented! (These include the following countries: Afghanistan, Bahrain, China, Hong Kong, Japan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, Uzbekistan, Macau, Mongolia, North Korea, Qatar, Kuwait, Saudi Arabia, South Korea, Nepal, Bhutan, Pakistan, India, Bangladesh, Myanmar, Taiwan, Thailand, Laos, Vietnam, Philippines, Cambodia, Malaysia, Brunei, Singapore, Indonesia, Timor Leste, Papua New Guinea, Venezuela)
Lock Folder XP is a new security tool that lets you lock your files, folders, and drives with your personal password. Locking folders, files, and drives also effectively protects you from malicious programs, such as viruses, worms, and trojans. Locking files, folders, and drives is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private, and confidential information. And because locking your files, folders, or drives makes them invisible, they cannot be deleted, damaged, or harmed in any other way. We also advise you to get Lock Folder XP if you have a laptop and travel frequently. After all, if your notebook gets lost or stolen, you do not want strangers to see your financial data, or credit card or Social Security numbers. A free trial version is available for download
This badly-named button actually allows you to split the UFD into a pseudo-optical drive and a flash memory area by moving the slider. Set a path to an ISO file (not a folder) in the ISO File Path box (you can browse using the folder icon). Click on the Make button to reformat the entire UFD into two disks, one for mass storage and one for the CDROM.
Running through the tests proved reasonably straightforward, although a couple of scan jobs seemed to have trouble traversing directory structures, occasionally only covering the first of several subfolders of the selected region.
Kaka USB Security is a lightweight application that was designed in order to provide you with a simple means of protecting your USB drives in no time.The program locks the target drive and prevents unauthorized access thus blocking all data leaks. 2b1af7f3a8