Himitsu – Toolset for generating domain-specific passwords from a master password.

Algorithm:

* key = substring(base64m(sha1(sha1(target) ^ sha1(master)), 0, 12)

Inputs:

* target – site/domain name

* master – master password

 

Description:

* Strings “target” and “master” are hashed using SHA-1.

* Those resulting hashes are XOR’ed together symmetrically.

* Result is rehashed using SHA-1.

* Binary string is turned to ASCII using *non-standard* base64 lookup string:

“ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz012345678901”

Note that the two last characters are 0 and 1.

* First 12 characters from the last step result is the key.

Notes:

* Due to the xor operation in mixing target and master inputs, the inputs can

be swapped and will still give same result key.

* Most importantly getting master or sha1(master) from key must be protected.

This is achieved by the rehashing step. Finding SHA-1 collisions will not

help attacker. Target input does not have to be secret.

 

Problems:

* Presence of the numbers in base64 lookup is low, giving higher possibility

of numberless keys. This will not give much advantage in brute-force

cracking with only-alphabetic key assumption, but may just be a problem

with sites that require numbers to be present in password.

Programs:

* web – index.php – For browsers with JavaScript enabled, will generate key on

the fly. Otherwise falls back to standard form and calculates key on server

side using php.

* web – index.html – Javascript only solution.

* posix – Console tool for simple key generation.

* gnome – Console tool, but uses gnome keyring for master key storage and

copies the resulting key to clipboard. Does not print key on screen.

 

Download : Zipball  | Tarball

read more in here

<===> Himitsu <===>

Author:

* handle: sh0

* post: sh0 ät yutani dot ee

Ophcrack LiveCD 3.4.0 released

Our Post about Ophcrack Before :

Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman’s original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.


Features

  • Cracks LM and NTLM Windows hashes
  • Free tables available for Windows XP, Vista and 7
  • Brute-force module for simple passwords
  • Audit mode and CSV export
  • Real-time graphs to analyze the passwords
  • LiveCD available to simplify the cracking
  • Loads hashes from encrypted SAM recovered from a Windows partition

Download Version: http://sourceforge.net/projects/ophcrack/files/ophcrack-livecd/3.4.0/
Read more right Here : http://ophcrack.sourceforge.net/

Skype BruteForce Tools V-1.0

With this program you can bruteforce Skype accounts. This is probably the first public Skype bruteforce tool. The developers of Skype are very fast in patching bugs and now there is a one minute anti-bruteforce protection. The only solution is sleep(60) and that is the way that allowto bruteforce a Skype Account, but is very very slow method. This tool is for education purpose only, Use it at you’r own risk.


Platform : Unix/linux

Download : skype.pl (2.3KB) 
Find other version |
Read more in here : http://code.google.com/p/skype-bruteforcer/

Scanner Atomic 1.0 – Website Scanner

Features
[*] Capture Dynamic sites by Dork / Captura de sites Dinâmicos por Dork.

[*] Capture Links following a site / Captura de Links de um seguinte site.

[*] Test SQL injection vulnerability in the sites captured. [*] Detection hash (Encryptions) / Teste da vulnerabilidade Sql injection nos sites capturados. [*]Detecção de hash(Criptografias)..

[*] Brute Force to break Encryptions / Força Bruta para quebra de Criptografias.

[*] Dscriptografia of base64 / Dscriptografia da base64.

Original language Portuguese

Platform : Windows
Download Latest Version : scanner atomic – instala__o.exe (2.0 MB)
Find other version | Read more in here

Update Websploit V1.3 – Open source tool for scan and analysis Vulnerabilitys

WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability

Description :
[+]Autopwn – Used From Metasploit For Scan and Exploit Target Service
[+]wmap – Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector – inject reverse & bind payload into file format
[+]phpmyadmin – Search Target phpmyadmin login page
[+]lfi – Scan,Bypass local file inclusion Vulnerability & can be bypass some WAF
[+]apache users – search server username directory (if use from apache webserver)
[+]Dir Bruter – brute target directory with wordlist
[+]admin finder – search admin & login page of target
[+]MLITM Attack – Man Left In The Middle, XSS Phishing Attacks
[+]MITM – Man In The Middle Attack


Platform : Unix/Linux

Download V1.3 : websploit-v 1.3.zip (1.1 MB)

Find other Version | Read more in here : http://code.google.com

Mysql Bruteforce V1.0 [Penetration Testing Tools]

A small application build to demo the weakness in mysql and networking. This is capable of running login attempts from multiple threads in parallel. The effect of this is instead of attempting to login to the server one at a time which is badly effected by network latency. This little tool will be able to run up to 1024 concurrent connections. An example of the performance difference is with a round trip time of around 50ms it takes around 5 minutes to attempt 1000 logins. With multiple threads it takes around 10 seconds (at basic broadband speeds). What is worse is that locally it is capable of trying 1000’s of password’s a second!

How to use: ./mysql_bruteforce.c [<options>]

-h Print this help and exit
-v Verbose. Repeat for more info
-t <host> host to try
-p <port> port to connect on
-n <num> number of threads to use

Note: usernames / password will be read from stdin
The format for this is username:password

Platform : Linux

Download Source Code : mysql_bruteforce.c

SSH Bruteforce [Penetration testing tools]

A small application built to try passwords against sshd

Options currently supported are

Usage: ./brute-ssh.exe [<options>]

-h Print this help and exit
-v Verbose. Repeat for more info
-t <host> host to try
-p <port> port to connect on
-n <num> number of threads to use

Note: usernames / password will be read from stdin
The format for this is username:password

Download Source script : Brute_force.c