Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Cain and Abel

Cain and Abel

Cain & Abel
A suprisingly robust suite of tools, Cain and Able is often simply characterized as a password recovery/cracking tool, but if you take a look at the list of features below, you’ll see it is much more than that. The sniffing component of Cain collects a LOT of information and any password hashes it graps can be simply passed over to the cracking section. Abel offers an easily detected backdoor (no stealth factor here) that also offers a wide range of easy to use features, including dumping password hashes, account lists, remote registry editing and a command line remote shell.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.

For more detail, see the Cain and Abel User Manual

Features overview
Cain’s features

Protected Storage Password Manager
Reveals locally stored passwords of Outlook, Outlook Express, Outlook Express Identities, Outlook 2002, Internet Explorer and MSN Explorer.

Credential Manager Password Decoder
Reveals passwords stored in Enterprise and Local Credential Sets on Windows XP/2003.

LSA Secrets Dumper
Dumps the contents of the Local Security Authority Secrets.

Dialup Password Decoder
Reveals passwords stored by Windows “Dial-Up Networking” component.

APR (ARP Poison Routing)
Enables sniffing on switched networks and Man-in-the-Middle attacks.

Route Table Manager
Provides the same functionality of the Windows tool “route.exe” with a GUI front-end.

SID Scanner
Extracts user names associated to Security Identifiers (SIDs) on a remote system.

Network Enumerator
Retrieves, where possible, the user names, groups, shares, and services running on a machine.

Remote Registry
Allows modification of registry parameters from the network.

Service Manager
Allows you to stop, start, pause/continue or remove a service.

Sniffer
Captures passwords, hashes and authentication information while they are transmitted on the network. Includes several filters for application specific authentications and routing protocols. The VoIP filter enables the capture of voice conversations transmitted with the SIP/RTP protocol saved later as WAV files.

Routing Protocol Monitors
Monitors messages from various routing protocols (HSRP, VRRP, RIPv1, RIPv2, EIGRP, OSPF) to capture authentications and shared route tables.

Full RDP sessions sniffer for APR (APR-RDP)
Allows you to capture all data sent in a Remote Desktop Protocol (RDP) session on the network. Provides interception of keystrokes activity client-side.

Full SSH-1 sessions sniffer for APR (APR-SSH-1)
Allows you to capture all data sent in SSH-1 sessions on the network.

Full HTTPS sessions sniffer for APR (APR-HTTPS)
Allows you to capture all data sent in HTTPS sessions on the network.

Full FTPS sessions sniffer for APR (APR-FTPS)
Allows you to capture all data sent in implicit FTPS sessions on the network.

Full POP3S sessions sniffer for APR (APR-POP3S)
Allows you to capture all data sent in implicit POP3S sessions on the network.

Full IMAPS sessions sniffer for APR (APR-IMAPS)
Allows you to capture all data sent in implicit IMAPS sessions on the network.

Full LDAPS sessions sniffer for APR (APR-LDAPS)
Allows you to capture all data sent in implicit LDAPS sessions on the network.

Certificates Collector
Grab certificates from HTTPS, IMAPS, POP3S, LDAPS, FTPS web sites and prepares them to be used by relative APR-* sniffer filters.

MAC Address Scanner with OUI fingerprint
Using OUI fingerprint, this makes an informed guess about what type of device the MAC address from.

Promiscuous-mode Scanner based on ARP packets
Identifies sniffers and network Intrusion Detection systems present on the LAN.

Wireless Scanner
Can scan for wireless networks signal within range, giving details on its MAC address, when it was last seen, the guessed vendor, signal strength, the name of the network (SSID), whether it has WEP or not (note WPA encrypted networks will show up as WEPed), whether the network is an Ad-Hoc network or Infrastructure, what channel the network is operating at and at what speed the network is operating (e.g. 11Mbps). Passive scanning and WEP IVs sniffing are also supported using the AirpCap adapter from CACE Technologies.

802.11 Capture Files Decoder
Decode 802.11 capture files (wireshark, pcap) containing wireless frames encrypted with WEP or WPA-PSK.

Access (9x/2000/XP) Database Passwords Decoder
Decodes the stored encrypted passwords for Microsoft Access Database files.

Base64 Password Decoder
Decodes Base64 encoded strings.

Cisco Type-7 Password Decoder
Decodes Cisco Type-7 passwords used in router and switches configuration files.

Cisco VPN Client Password Decoder
Decodes Cisco VPN Client passwords stored in connection profiles (*.pcf).

VNC Password Decoder
Decodes encrypted VNC passwords from the registry.

Enterprise Manager Password Decoder
Decodes passwords used by Microsoft SQL Server Enterprise Manager (SQL 7.0 and 2000 supported).

Remote Desktop Password Decoder
Decodes passwords in Remote Desktop Profiles (.RPD files).

PWL Cached Password Decoder
Allows you to view all cached resources and relative passwords in clear text either from locked or unlocked password list files.

Password Crackers
Enables the recovery of clear text passwords scrambled using several hashing or encryption algorithms. All crackers support Dictionary and Brute-Force attacks.

Cryptanalysis attacks
Enables password cracking using the ‘Faster Cryptanalytic time – memory trade off’ method introduced by Philippe Oechslin. This cracking technique uses a set of large tables of pre calculated encrypted passwords, called Rainbow Tables, to improve the trade-off methods known today and to speed up the recovery of clear text passwords.

WEP Cracker
Performs Korek’s and PTW WEP attacks on 802.11 capture files containing enough WEP initialization vectors.

Rainbowcrack-online client
Enables password cracking by mean of the outstanding power of this on-line cracking service based on RainbowTable technology.

NT Hash Dumper + Password History Hases (works with Syskey enabled)
Will retrieve the NT password hash from the SAM file regardless of whether Syskey in enabled or not.

Syskey Decoder
Will retrieve the Boot Key used by the SYSKEY utility from the local registry or “off-line” SYSTEM files.

MSCACHE Hashes Dumper
Will retrieve the MSCACHE password hashes stored into the local registry.

Wireless Zero Configuration Password Dumper
Will retrieve the wireless keys stored by Windows Wireless Configuration Service.

Microsoft SQL Server 2000 Password Extractor via ODBC
Connects to an SQL server via ODBC and extracts all users and passwords from the master database.

Oracle Password Extractor via ODBC
Connects to an Oracle server via ODBC and extracts all users and passwords from the database.

MySQL Password Extractor via ODBC
Connects to an MySQL server via ODBC and extracts all users and passwords from the database.

Box Revealer
Shows passwords hidden behind asterisks in password dialog boxes.

RSA SecurID Token Calculator
Can calculate the RSA key given the token’s .XML activation file.

Hash Calculator
Produces the hash values of a given text.

TCP/UDP Table Viewer
Shows the state of local ports (like netstat).

TCP/UDP/ICMP Traceroute with DNS resolver and WHOIS client
A improved traceroute that can use TCP, UDP and ICMP protocols and provides whois client capabilities.

Cisco Config Downloader/Uploader (SNMP/TFTP)
Downloads or uploads the configuration file from/to a specified Cisco device (IP or host name) given the SNMP read/write community string.

Abel features
Remote Console
Provides a remote system shell on the remote machine.

Remote Route Table Manager
Enable to manage the route table of the remote system.

Remote TCP/UDP Table Viewer
Shows the state of local ports (like netstat) on the remote system.

Remote NT Hash Dumper + Password History Hases (works with Syskey enabled)
Will retrieve the NT password hash from the SAM file regardless of whether Syskey in enabled or not; works on the Abel-side.

Remote LSA Secrets Dumper
Dumps the contents of the Local Security Authority Secrets present on the remote system.

SEE ALSO:
…more from the “Tools” category

Leave a Reply

You must be logged in to post a comment.