- 1、本文档共6页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
How to use Elcomsoft Advanced Attacks - Powered by Kayako Help Desk Software
How to use Elcomsoft Advanced Attacks - Powered by Kayako Help Desk Software
file:///C|/Users/YUJM/Desktop/How%20to%20use%20Elcomsoft%20Advanced%20Attacks%20-%20Powered%20by%20Kayako%20Help%20Desk%20Software.htm[2015/04/01 星期三 19:31:43]
English (U.S.)Home Submit a Ticket Knowledgebase
Lost password
(3)
(5)
(12)
Remember me
KNOWLEDGEBASE
General questions
Ordering and licensing
Legal
Forensics
Password recovery
Elcomsoft products
Knowledgebase: Password recovery
How to use Elcomsoft Advanced Attacks
Posted by Andrey Malyshev on 27 March 2014 09:00 PM
Password recovery for new file formats can be a very complicated task and may take a long time. In
modern world password recovery speed becomes slower and slower, so simple Brute-force or
Dictionary attack is not enough for effective password breaking. We can try to use the human factor
for password recovery. Most of people dont use randomly generated strong passwords because
they are very hard to remember. People invent they own password creation rules and think their
passwords are strong.
For example, the rule can be as follows:
[My name] [Year of birth] [Some random characters, easy to remember]
And the possible passwords are:
John1974abc
John1974def
...
etc
These passwords are very weak but cannot be recovered using simple Brute-force or Dictionary. We
created our advanced attack engine to help to recover such passwords.
The following attacks are available:
Word attack
This attack tries all possible variations of the given word and applies all possible mutations to each
variation.
Dictionary attack
Dictionary options
Press Add to add dictionary file(s) to the list, Remove to remove the selected one(s), and
Up/Down to change an order.
Password mutation options
Login
SEARCH
How to use Elcomsoft Advanced Attacks - Powered by Kayako Help Desk Software
file:///C|/Users/YUJM/Desktop/How%20to%20use%20Elcomsoft%20Advanced%20Attacks%20-%20Powered%20by%20Kayako%20Help%20Desk%20Software.htm[2015/04/01 星期三 19:31:43]
Here you
您可能关注的文档
- First Measurement of the Production of a W Boson in Association with a Single Charm Quark i.pdf
- Flavour formation.pdf
- Fluid inclusion evidence for petroleum accumulation in northern Qaidam Basin.pdf
- fluke10用户手册.pdf
- FLUKE 8808A 数字万用表用户手册.pdf
- Flavour formation in meat and meat products.pdf
- Flux interactions on D-branes and instantons.pdf
- Fluorescence Versus White-Light Bronchoscopy Rand.pdf
- Flow patterns past two circular cylinders in proximity.pdf
- FM Global 资产防损(常见危险源)---ArsonThreat.pdf
- HOW TO MAKE MY FAVORITE FOOD.ppt
- How+to+use+RSS+to+track+literature.ppt
- HP-UX Fibre Channel (fcd, fclp) and FlexFabric FCoE (fcoc) Host Bus Adapter Support Matrix, March 25.pdf
- HP StorageWorks MSL2024 Tape Library getting started (AK378-96028, March 2010).pdf
- HSPICE 实战手册.pdf
- How to use RSS to track literature.ppt
- HSP高并发之监控平台1.0.pdf
- HT2801规格书新.pdf
- HSU2025 使用手册 Rev 2011-05-25.pdf
- HTML5.Canvas.教程.pdf
文档评论(0)