Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.
- Cracks LM and NTLM Windows hashes
- Free tables available for Windows XP, Vista and 7
- Brute-force module for simple passwords
- Audit mode and CSV export
- Real-time graphs to analyze the passwords
- LiveCD available to simplify the cracking
- Loads hashes from encrypted SAM recovered from a Windows partition
While I've used previous versions of Ophcrack with success on XP, the Ophcrack 3.6 live disk failed to crack passwords for Windows 7 Professional. I also installed the 64 bit version, then selected and downloaded the available Vista tables (since no free Windows 7 tables were available), and it also failed to crack passwords on Windows 7 Pro.
I have been trying to use this program for about a month now. I tried burning it to a cd and booting up my laptop. It doesnt register. It just loads windows. It takes a minute longer to load to log in screen but thats it. If i log in, it picks the cd up as "Ophcrack livecd". I then tried it on usb. Downloaded usbboot, copied/burned ophcrack to the 8gb usb(fat32). The system sees the usb as "ophcrack livecd". i restart, open boot menu, select the usb and still nothing. It loads windows. I have ophcrack v3.6.0. I am running Windows 7 ultimate. Why is it not working? Im so sure i have done everything 100%. Please help.
I am having a problem using this version 3.6.0. When I boot this live cd it does not load the tables. It only apply brute force attack. I have used version 3.4.0 before and checked passwords of windows 7 on three systems. 2 were found and on one PC this live cd didnot showed any passwords. Then I tried this latest version 3.6.0 but it is not loading any tables to find the password. So I need help about this problem. What I can do to load the tables? Need help !!!!
md5 hash don't match ? ophcrack-xp-livecd-3.6.0.iso Image Files (425 MB) 'ophcrack" md5 hash=md5sum: b23afa62f670dee41c8f01c436c0a092 - my crunch hash results=AA07109BB94430BE889933DBAD42390F
I got the LIVE disc and burned it to CDR. After one try with "automated," on Windows XP Professional, I clicked on the link to reveal the password. It said, "file not found." Fortunately, the program did show that the Administrator account had no password set at all, so I used the info to log in and reset my account's password. Everyone should know that I didn't spend ANY time on the issue and only read about 2% of what the program had to offer. I zipped on through and decided it would be much faster to use what I learned from OPHCRACK to choose the Administrator login route. <br><br>This program probably works. Thanks!