More information on Cain and Abel @ http://www.oxid.it/cain.html
More information on John the ripper @ http://en.wikipedia.org/wiki/John_the_Ripper
The list of supported services includes: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP, PostgreSQL, Teamspeak, Cisco auth, Cisco enable, and Cisco AAA.
More information on THC-Hydra @ http://freeworld.thc.org/thc-hydra/
More information on Aircrack @ http://www.aircrack-ng.org/doku.php
802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.
AirSnort requires approximately 5-10 million encrypted packets to be gathered. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second.
More information @ http://airsnort.shmoo.com/
More information on Pwdump6 @ http://www.foofus.net/fizzgig/pwdump/
Some ready to work lanmanager and md5 tables are demonstrated in Rainbow Table section. One interesting table set is the lm configuration #6 tables, with which we can break any windows password up to 14 characters in a few minutes.
More information on Rainbowcrack @ http://www.antsight.com/zsl/rainbowcrack/
Brutus can be downloaded from: http://www.hoobie.net/brutus/
NOTE : This blog is developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. (I) The blog owner will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall (I) the blog owner be liable for such damages or loss of data. Please read the License Agreement in the program carefully before using it.