Tuesday, May 24, 2016

Cain & Abel 4.9.43 Portable

Cain & Abel is the perfect tool for users who lost their s and want to recover them. It allows you to encrypted s using Dictionary, Brute-Force and Cryptanalysis attacks. Cain & Abel is a recovery tool for Operating Systems. It allows sy recovery of various kind of s by sniffing the network, encrypted s using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled s, recovering wireless network , revling boxes, uncovering cached s and analyzing routing protocols.

The program does not any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/wkness present in protocol's standards, authentiion methods and caching mechanisms; its main purpose is the simplified recovery of s and credentials from various sources, however it also ships some "non standard" utilities for users.

Cain &Abel has been developed in the hope that it will be useful for network administrators, tchers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical rsons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Plse carefully rd the Agreement included in the program before using it.

The latest version is faster and contains a lot of new ftures like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentiion mechanisms. The new version also ships routing protocols authentiion monitors and routes extractors, dictionary and brute-force s for all common hashing aorithms and for several specific authentiions, /hash calculators, cryptanalysis attacks, ders and some not so common utilities related to network and system security.



No comments:

Post a Comment