Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.
- Cracks LM and NTLM Windows hashes
- Free tables available for Windows XP, Vista and 7
- Brute-force module for simple passwords
- Audit mode and CSV export
- Real-time graphs to analyze the passwords
- LiveCD available to simplify the cracking
- Loads hashes from encrypted SAM recovered from a Windows partition
I have used Ophcrack in the past with XP and Win 7 with good results but I have a Win 10 Asus with dual displays and Linux does not seem to be happy with it. 'No X server running' or 'cannot connect to X server :0.0' errors seeming to indicate a problem talking to my display. Tried 1 display at a time with no change. Text is coming across fine. Thought I could just run text mode but so far I cannot find any instructions or commands for running Ophcrack in command-line. Anyone able to help out to be able to run either way? I would give a Good rating if I could run the program as I have in the past. Going to the forum link takes me to the review page.
What a monumental waste if time. Download two, 600+ meg programs (ver 3.6.0 and 3.4.0) and have neither contain the tables needed to work. Yes, I know it's free, but a free piece of crap is still a piece of crap. The program may be free but my time isn't. DON'T BOTHER!!!
Sadly this will no longer work with the online login of windows (8, 10)
NIS seems very determined to keep this file from my system. Some password recovery tools send your passwords, keys etc to a third party. When you install it (if you get this far) use the now free ENT (Essential Net Tools) from Tamosoft and check the outbound IP of any module associated with program. I intend staying clear.
well i must be that 1% thaT THE PROGRAM DOESNT WORK FOR LOL been stuck on sending discover for cpl hrs now and nothing else happening