Search
Home
Saved
106 views
0
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
CAIN AND ABEL An Overview
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
BY
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
ACKNOWLEDGMENT
I found out this course quite interesting, informative and knowledgeable. course of study, I enhanced knowledge and information about the subject through and the study material provided as a reference from our course teacher.
I would like to thank our course teacher Respected Waqar Ahmed who not only sh practical experiences related to the subject with us but also extended his
guidance/support during the course and at the same time keeping a very close loo
performances in this whole session. I feel it is his guidance that i am able to comp
study in due course of time. During the study of, i consider Internet to be the best s information and were very helpful.
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
Join
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
1
Download
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
ABSTRACT
This study briefly provides an overview of the tool CAIN & ABEL. It covers its
techniques and features that would be helpful for a security professional. Cain & A
has been developed in the hope that it will be useful for network administrators, te
security consultants/professionals, forensic staff, security software vendors, prof penetration testers and everyone else that plans to use it for ethical reasons.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Upload
Sign In
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
CONTENTS INTRODUCTION PROGRAM FEATURES
DECODERS Protected Storage LSA Secrets Wireless Password Dumper Dialup Password Enterprise Manager Password Decoder Credential Manager Password Decoder Window Vault NETWORK SNIFFERS ARP Poison Routing CRACKER WIRELESS SCANNERS TRACEROUTE QUERY CCDU You're Reading a Preview TOOLS Unlock full access with a free trial. Route & TCP/UDP tables Base64 Password Decoder Download With Free Trial Access Database Password Decoder Cisco Type -7 Password Decoder Cisco VPN Client Password Decoder VNC Password Decoder Read Free Foron 30this Days Sign up to vote title Hash Calculator Useful Not useful Cancel anytime. RSA SecureID Token Calculator Special offer for students: Only $4.99/month. Abel
Master your semester with Scribd & The New York Times
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
CAIN & ABEL INTRODUCTION
Cain & Abel offers wide variety of capabilities. It is a password recovery tool for Operating Systems. It allows easy recovery of several kind of passwords by sniffing the cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, VoIP conversations, decoding scrambled passwords, recovering wireless network keys, password boxes, uncovering cached passwords and analyzing routing protocols. Cryp attacks are done via rainbow tables which can be generated with the winrtgen.exe provided with Cain and Abel. It another main feature is ARP poisoning also known as man attack.
Cain is the first part of the program. Developed with a simple Windows graphical user inte main purpose is to concentrate several hacking techniques and proof of concepts pr simplified tool focused on the recovery of passwords and authentication credentials from sources. Abel is the second part of the program. Designed as a Windows NT service it is c by two files "Abel.exe" and "Abel.dll"; the first is the main service executable program second is a library that contains some required functions. You're Reading a Preview Unlock full access with a free trial.
The program does not exploit any software vulnerabilities or bugs that could not with little effort. It covers some security aspects/weakness intrinsic of protocol's s Download With its Free Trialpurpose is the simplified the re authentication methods and caching mechanisms; main passwords and credentials from various sources, however it also ships some "nonstandard for Microsoft Windows users. Read Free Foron 30this Days Sign up to vote title
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
Join
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
1
Download
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
PROGRAM FEATURES DECODERS
A decoder is a device which does the reverse operation of an encoder, undoing the
so that the original information can be retrieved. In simple words, it is used to simple de information. Cain and Abel provide various ways of decoding cached passwords. Protected Storage
The Protected Store is a storage facility provided as part of Microsoft CryptoAPI. It's use is to securely store private keys that have been issued to a user. All of the informati Protected Store is encrypted, using a key that is derived from the user's logon password. the information is tightly regulated so that only the owner of the material can access it. Credentials are stored in the registry under the key HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider\ Many Windows applications use this feature; Internet Explorer, Outlook and Outlook Ex example store user names and passwords using this service. This feature enumerates thos and decodes the following type of credentials: - MS Outlook 2002's passwords (POP3, SMTP, IMAP, HTTP) - Outlook Express's passwords (POP3, NNTP, SMTP, IMAP, HTTP, LDAP, HTTP-Mail) - Outlook Express Identities You'reSMTP, Reading Preview - MS Outlook's passwords (POP3, NNTP, IMAP,a LDAP, HTTP-Mail) - MSN Explorer's Sign In passwords Unlock full access with a free trial. - MSN Explorer's Auto Complete passwords - Internet Explorer's protected sites passwords - Internet Explorer's Auto complete passwords With Free Trial Download
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
LSA Secrets
LSA Secrets are used to store information such as the passwords for service accoun start services under an account other than local System. Dial-Up credentials and other ap defined passwords also reside here:-
You're Reading a Preview Unlock full access with a free trial.
Wireless Password Dumper
Download With Free Trial This feature enables the recovery of wireless keys stored by Windows's Configuration Service. WEP keys are automatically decoded. WPA-PSK keys are displaye hexadecimal format because of the usage of the SHA1 one-way hashing function. Read Free Foron 30this Days Sign up to vote title
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
Dial-Up Password
The Dial-Up Password Decoder reveals passwords stored by Windows "Dial-Up Networking" component. RAS are usually stored in LSA Secrets " L$_RasDefaultCredentials" while all other connection parameters (phone address....) reside into Phonebook files (.pbk).
You're Reading a Preview Unlock full access with a free trial.
Enterprise Manager Password Decoder
Download With Free Trial Enterprise Manager is a Windows application used to manage Microsoft SQL Serve 2000. When configured to use SQL Server authentication, Enterprise Manager stores the co credentials in the registry under the key QL2000: HKEY_CURRENT_USER\\Software\\Microsoft\\MicrosoftSQLServer\\80\\Tools\\SQLEW\\RegisteredSe Read Free Foron 30this Days Sign up to vote title
Master your semester with Scribd X\\ and SQL 7.0: HKEY_CURRENT_USER\\Software\\Microsoft\\MSSQLServer\\SQLEW\\Registered Servers & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
1
Download
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
Credential Manager Password Decoder
Credential Manager is a new solution that Microsoft offers in Windows Server 2 Windows XP to provide a secured store for credential information. It allows user na passwords as inputs for various network resources and applications once, and then th automatically supply that information for subsequent visits to those resources with involvement. Credential Manager stores the supplied password in the so called "Enterprise Crede of the local machine. This set of credentials is stored in the file and is encrypted. \DocumentsandSettings\%Username%\ApplicationData\Microsoft\Credentials\%UserSID% Credentials There is also another set used for credentials that should persist on the local mac and cannot be used in roaming profiles, this is called "Local Credential Set" and it refers to \DocumentsandSettings\%Username%\Localsettings\ApplicationData\Microsoft\Credentia %UserSID % \Credentials Accordingly with the MSDN documentation, Credential Manager can store differen credentials under the form of passwords, security or certificate files. Value CRED_TYPE_GENERIC
Description
The credential is a generic credential. The credential will not be any particular authentication package. The credential will be sto securely but has no other significant characteristics.
TheReading credentialaisPreview a password credential and is specific to Micro You're
CRED_TYPE_DOMAIN_PASSWORD
CRED_TYPE_DOMAIN_CERTIFICATE
authentication packages. The NTLM, Kerberos, and Negotiate Unlockauthentication full access withpackages a free trial.will automatically use this credential w connecting to the named target.
The credential is a certificate credential and is specific to Micro
Download With Free Trial authentication packages.
The credential is a password credential and is specific to Micro CRED_TYPE_DOMAIN_VISIBLE_PASSWORD authentication packages. The Passport authentication package automatically use this credential when connecting to the named
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title * Non-developer users can interact with Credential Manager using the Useful application User Names and P & The New York Times Not useful "Stored that can be found under: Start-> Settings-> Control Panel-> User Accounts-> %Account% -> Manage m Special offer for students: Only $4.99/month. passwords.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
Window Vault
This feature provides the stored ‘user name and ‘password of resources that is us the particular system:’
’
NETWORK
The Network Enumerator uses the native Windows network management functio to discover what is present on the network. It allows a quick identification of Domain Co SQL Servers, Printer Servers, Remote Access Dial-In Servers, Novell Servers, Apple File Terminal Servers and so on. It can also display when possible the version of their operating
The left tree is used to browse the entire network and quick list to connect to machines; once connected to a server one can also enumerate user names, groups, serv shares present on it. By default the program connects to remote IPC$ shares using the cur logged on user and if it fails using NULL sessions (Anonymous sessions); however it is also to specify the credentials to be used for the connection. The Quick List can be used to addresses of hosts that are seen browsing the network. You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
106 views
0
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
1
Download
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
SNIFFER
Cain's sniffer is principally focused on the capture of passwords and authe
information travelling on the network. It has been developed to work on switched net mean of APR (Arp Poison Routing). Protocol Filters
There is a BPF (Berkeley Packet Filter) hard-coded into the protocol driver that performs so traffic screening. The filter instructs the protocol driver to process only ARP and IP traffic; Password Filters
The sniffer includes several password filters that can be enabled/ disabled from configuration dialog; they are used to capture credentials from the following protoco different types of protocols like FTP, HTTP, POP3, MySQL, etc).
Cain uses different protocol state machines to extract from network packet information needed to recover the plain text form of a transmitted password. Some authe protocols use a challenge-response mechanism. On switched networks this can be achiev mirror port on the switch or if APR reaches the FULL-Routing state.
You're Reading a Preview
When APR (Arp Poison Routing) must process packets that Unlock is full enabled, access with athe freesniffer trial. aren't seen and also re-route them to the correct destination; this can cause per bottlenecks on heavy traffic networks. APR's main advantage Download With Free Trial is that it enables sniffing on networks and also permits the analysis of encrypted protocols such as HTTPS and SSH -1.
and hashes areScribd stored in .LST files in the program's directory. These file Master yourPasswords semester with Read Free For 30 Days Sign up to vote on this title separated files so can be viewed or import with preferred word processor (e.g.: POP3.LST & The New York Times Useful Not useful passwords and hashes sniffed from the POP3 protocol). For HTTPS, SSH-1 and Telnet Special offer forentire students: Only $4.99/month. sessions are decrypted and dumped into text files.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
106 views
0
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial ARP (ARP Poison Routing) is a main feature of the program, this type of attack is
the manipulation of the host’s ARP cache. When two host want to communicate with ea
Master your semester with Scribd MAC a they must know their MAC addresses, here the ARP table ofFree source host look for Read Foron 30this Days Sign up to vote title destination broadcast an ARP request. Although this & The New Yorkto Times Usefulrequest useful to every ho ARP Notreach Cancel anytime.
host, whose MAC is specified in the request will reply. In this way it can al Special offer fornetwork students: but Onlythe $4.99/month.
victim of communicating with the in correct MAC address also known as Man in the Middle
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
In a brute force attack, the computer tries all the possible combinations in a hop least one will work. This method of breaking password is very time consuming and the factor remains very low, especially You're for strong passwords. For example, even if a password Reading a Preview known precisely to be 9 characters, the brute force attack may take up to 8 days to break. Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
The dictionary attack could be faster than brute force but it again depends upon th the dictionary. In this case, a dictionary file containing one word per line is provided as an to the Cain & Abel software. The software then tries each word as the password and stop as the password is matched. This type of attack is used to break computer login passwords.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
WIRELESS SCANNER
Cain's wireless scanner scans the wireless networks that are in range of the comput Wireless Scanner detects Wireless Local Area Networks (WLANs) using 802.11x. How Active Scanner works
The active scanner opens the wireless network adapter using the Winpcap proto then it uses the "Packet Request" function of the same driver to communicate with the network card. This API can be used from the Windows User Mode to perform a query/set o on an internal variable of the network card driver. Passive Scanner
The passive scanner recognize wireless Access Points (upper list) and clients (lo decoding 802.11b/g packets that travels on the air in a completely passive way. The Hopping" feature changes the frequency of the adapter every second and let you discover networks on different channels. Cain also supports automatic ARP Requests injection (to the collection of unique WEP IVs) and the capture of WPA-PSK authentication hashes. Requirements
You're Reading a Preview
This feature requires a Windows compatible wireless network interface and the Winpcap Unlock full access with a free trial. driver. The Passive Scan feature requires the AirPcap adapter and drivers from CACE Techno Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
1
Download
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
QUERY
The query feature allows a user to open Excel files, dBase or MS Access database an the records using commands of Structured Query Language.
The scope of SQL includes data insert, query, update and delete, schema crea modification, and data access control. Although SQL is often described as, and to a great ex declarative language (4GL), it also includes procedural elements. The most common ope SQL is the query, which is performed with the declarative SELECT statement. SELECT retri from one or more tables, or expressions. Standard SELECT statements have no persistent e the database. A query includes a list of columns to include in the final result, immediately the SELECT keyword. An asterisk ("*") can also be used to specify that the query should columns of the queried tables. SELECT is the most complex statement in SQL, with keywords and clauses that include:
The FROM clause, which indicates the table(s) to retrieve data from. The FROM c include optional JOIN sub clauses to specify the rules for joining tables. The WHERE clause includes a comparison predicate, which restricts the rows return query. The WHERE clause eliminates all rows from the result set where the co predicate does not evaluate to True.
You're Reading a Preview The following example shows a result of simple SQL query "SELECT * FROM [Table1]" whic to select and display all records of table named Table1. Table1 has two fields, namely "T Unlock full access with a free trial. "Projects". Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
Queries may be entered either in the Query statement box or run by clicking on
drop down list and selecting the query. For example, if we want to select "Tools" of E You're below: Reading a Preview "Project", i may execute the query shown Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
TOOLS The tools that are defined in Cain and Abel are:-
Route Table & TCP/IP Tables:-
These tables can be viewed through Alt+R and Alt+P commands or from the t in tools Manu.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
1
Download
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
Base64 Password Decoder
Base64 is a group of similar binary-to-text encoding schemes that represent binary d ASCII string format by translating it into a radix-64 representation. The term Base64 origin
a specific MIME content transfer encoding.
Base64 encoding schemes are commonly used when there is a need to encode bin that needs to be stored and transferred over media that are designed to deal with textual d is to ensure that the data remains intact without modification during transport. Base64 is c used in a number of applications including email via MIME, and storing complex data in XM
ALT+6 shortcut is used to access Base64 password decoder. Alternatively, one can
Tools menu and then on Base64 Password Decoder option. A button to access this featu
available on the OXID toolbar. A screenshot of decrypted password ( password = XenShi below:-
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
Join
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
Microsoft Access stores data in its own format based on the Access Jet Database Engine. It import or link directly to data stored in other applications and databases. Breaking Into Access Passwords
Due to the fact that OXID is designed for Windows XP or earlier version of
operating systems, it can only be used to break passwords of MS Access 2003 or earlier (.mdb format not .accdb format).
In order to break MS Access database passwords, one can either press CTRL+A o
Access Database Password Decoder from the Tools menu. In the popup form that appea
screen, one can choose the MS Access database filename and OXID can instantly pro
password of that database. A screen shot of the example is shown below in which the d password ('sony') can be seen.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title CISCO Type 7 Password Decoder & The New York Times Useful Not useful CISCO IOS stands for Cisco Internetworking Operating System. IOS can be thought o Special offer for students: Only $4.99/month.
Cancel anytime.
router's operating system. There are three different types of CISCO IOS passwords:
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
3. Cisco IOS Type 5 Passwords This type of passwords are encrypted using MD5 hashing algorithm and is used by
IOS to encrypt enable secret password. The MD5 message-digest algorithm is a wi
cryptographic hash function producing a 128-bit (16-byte) hash value, typically exp text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide cryptographic applications, and is also commonly used to verify data integrity. *This feature is not supported in OXID application.
CISCO VPN Client Password Decoder You're Reading a Preview The Cisco Systems VPN Client was a software application for connecting to a virtu Unlock full access with a free trial. network. The client makes remote resources of another network available in a secure way user was connected directly to that "private" network. The client uses profile files (.pcf) t Download With Free Trial VPN passwords either hashed with type 7, or stored as cleartext. A vulnerability has been i and those passwords can easily be decoded using software or online services. To work arou issues, network administrators are advised to use the Mutual Group Authentication featu Free Foron 30this Days unique passwords (that aren't related to other importantRead network passwords). Sign up to vote title
Master your semester with Scribd Example & The New York Times
Not useful Cancel anytime.
Useful
Say for$4.99/month. example, the password is MySecretpass200. enc_GroupPwd en enc_User Special offer for students: Only contains encrypted passwords. One .pcf file looks like this:
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Upload
Sign In
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
When this enc_GroupPwd is entered in OXID, it will reveal the actual password as show pictorially.
VNC Password Decoder
vncpasswd allows to set the password used to access VNC desktops. Its default beh prompt for a VNC password and then store an obfuscated version of this password to passw to $HOME/.vnc/passwd if no password file is specified.) The vncserver script runs vncpa first time start a VNC desktop, and it invokes Xvnc with the appropriate -rfbauth option. can also be given a password file to use via the -passwd option.
The password must be at least six characters long (unless the -f command-line used), and only the first eight characters are significant. You're Reading a PreviewNote that the stored passwo encrypted securely - anyone who has access to this file can trivially find out the plain-text p Unlock full access with a free trial. so vncpasswd always sets appropriate permissions (read and write only by the owner.) when accessing a VNC desktop, a challenge-response mechanism is used over the wire Download With Free Trial hard for anyone to crack the password simply by snooping on the network.
Example:Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title A screen shot Times of VNC decrypted password in hex is given below. encrypted passw & The New York Not useful Useful The
Cancel anytime. from Hash Calculator provided by OXID and re-entered into VNC Password de Special offer forobtained students: Only $4.99/month.
verify the results.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
Hash Calculator
A cryptographic hash function is a hash function which is considered practically impossible that is, to recreate the input data from its hash value alone. These one-way hash functi been called "the workhorses of modern cryptography". One of the applications of Cryptographic Hash Function is to verify the integrity of files or m Determining whether any changes have been made to a message (or a file), for exampl accomplished by comparing message digests calculated before, and after, transmission (or event). MD5, SHA1, or SHA2 hashes are sometimes posted along with files on websites or f allow verification of integrity. MDF5
The MD5 message-digest algorithm is a widely used cryptographic hash function producing (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. been utilized in a wide variety of cryptographic applications, and is also commonly used data integrity. SHA1
In cryptography, SHA-1 (SHA stands for "secure hash algorithm") is a cryptographic hash designed by the United States National Security Agency and is a U.S. Federal Information P Standard published by the United States NIST. SHA-1 produces a 160-bit (20-byte) hashReading value. aAPreview SHA-1 hash value is typically rende You're hexadecimal number, 40 digits long. Unlock full access with a free trial.
Application Example:-
Download With Free Trial The Hash calculator of OXID provides encrypted data in different formats (MD2, MD4, MD etc). The following table shows the encrypted password ' Crypto123' encrypted usin algorithms (described above and more). Read Free For 30 Days
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Sign up to vote on this title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Join
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
RSA SecurID Token Calculator
SecurID, now known as RSA SecurID, is a mechanism developed by Security Dynamics (
Security and now RSA, The Security Division of EMC) for performing two-factor authentica user to a network resource. The RSA SecurID authentication mechanism consists of a "token" — either hardware (e dongle) or software (a soft token) — which is assigned to a computer user and which gen authentication code at fixed intervals (usually 60 seconds) using a built-in clock and t factory-encoded random key (known as the "seed"). The seed is different for each toke loaded into the corresponding RSA SecurID server (RSA Authentication Manager, ACE/Server) as the tokens are purchased.
Abel
Abel is the second part of the program. Designed as a Windows NT service it is compose files "Abel.exe" and "Abel.dll"; the first is the main service executable program and the se library that contains some required functions. Although Cain is the main Abel's front-end needed to be installed for Abel to work. The service can be installed locally or remotely (us and requires Administrator's privileges on the target machine. Once installed, as all services, it can be managed using the standard Windows tools or the Cain's Service Manage
You're a Preview Abel communicates with Cain using a theReading Windows named pipe "\\computername\pipe\ it can accept connections from multiple at the time. All data transmitted over th Unlockhosts full access with same a free trial. encrypted using the RC4 symmetric encryption algorithm and the fixed key "Cain & Abe done only to scramble the traffic sent on the network and not to hide program's intentions. Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
0
106 views
Sign In
Upload
Join
RELATED TITLES
1
Project Report Cain & Abel Uploaded by SyedaAmbreenZaffar
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
This is a comprehensive report on a Network Monitoring Tool Cain & Abel. It covers the description of all features and the concept behind those features and tools in detail.
Save
Embed
Share
Print
Download
1
of 27
SQL PDF 2
Assignment No PART B-02 SHA-1
Syllabus_CSE11.0_18_a
Search document
References:-
http://www.oxid.it
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/dpapiusercredentials.asp (Provide more information about cred http://en.wikipedia.org/wiki/SQL http://en.wikipedia.org/wiki/Base64 http://en.wikipedia.org/wiki/Microsoft_Access http://pen-testing.sans.org/resources/papers/gcih/cisco-ios-type-7-password-vulnerability-100566 http://en.wikipedia.org/wiki/MD5 https://www.m00nie.com/type-7-password-tool/ http://en.wikipedia.org/wiki/Cisco_Systems_VPN_Client http://www.base64online.com/Cisco-vpn-client-password-cracker.php http://linux.die.net/man/1/vncpasswd http://en.wikipedia.org/wiki/Cryptographic_hash_function
You're Reading a Preview
http://en.wikipedia.org/wiki/MD5
Unlock full access with a free trial.
http://en.wikipedia.org/wiki/SHA-1 http://en.wikipedia.org/wiki/SecurID
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join