Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.
- Cracks LM and NTLM Windows hashes
- Free tables available for Windows XP, Vista and 7
- Brute-force module for simple passwords
- Audit mode and CSV export
- Real-time graphs to analyze the passwords
- LiveCD available to simplify the cracking
- Loads hashes from encrypted SAM recovered from a Windows partition
trying to get admin pwd from an XP embedded SP3 install. Admin pword seems to be stored in NT hash only (no LM listed). So I've tried using all the vista tables (free ones) but it returns not found. Any other ideas? Seems to be no forum for support. thx
I have used Ophcrack in the past with XP and Win 7 with good results but I have a Win 10 Asus with dual displays and Linux does not seem to be happy with it. 'No X server running' or 'cannot connect to X server :0.0' errors seeming to indicate a problem talking to my display. Tried 1 display at a time with no change. Text is coming across fine. Thought I could just run text mode but so far I cannot find any instructions or commands for running Ophcrack in command-line. Anyone able to help out to be able to run either way? I would give a Good rating if I could run the program as I have in the past. Going to the forum link takes me to the review page.
flawless. keep up the good work.
Last livecd 3.6.0 version does not work because it does not have table. livecd version 3.4.0 was very good.
What a monumental waste if time. Download two, 600+ meg programs (ver 3.6.0 and 3.4.0) and have neither contain the tables needed to work. Yes, I know it's free, but a free piece of crap is still a piece of crap. The program may be free but my time isn't. DON'T BOTHER!!!