05.06.2023
Reset Windows Password v13.1
Forensic tools to analyze Remote Desktop activity in Windows
Found messagesPasscape Wireless Password Recovery: using the program's intelligence to automate the password recovery process for wireless networks
The current wireless networking standard uses a well-tested and reliable hashing function based on ... More >>
Date: 16:40:32 22.05.2020
Categories: Articles Keywords: wireless password recovery, lost, lost my password, password, wireless, network, recover, extract, hash, handshake, wpa, wifi, quick, pmkid, security, hashcat, elcomsoft, algorithm, sha, pbkdf2, automate Total recall: optimizing recovery process for Windows PINs based on dates
PIN stands for Personal Identification Number. But it is not just a number. It was first introduce ... More >>
Date: 09:59:47 03.04.2020
Categories: Articles Keywords: windows, pin, code, recover, restore, optimize, decrypt, guess, mask, hash Obscurity first
That was Windows Security's stupid behavior again that compelled us for this desperate p ... More >>
Date: 17:12:39 16.03.2020
Categories: Articles Keywords: windows, password, security, antivirus, software, defender, safe, personal, artificial, data Farewell to Syskey!Download the article as a PDF file, Hindi version, or Russian version
Fare thee well, and ... More >>
Date: 15:11:44 19.10.2017
Categories: Articles Keywords: syskey, encryption, md5, rc4, aes, decrypt, registry, microsoft, key, sam, windows, fall creators update DPAPI-NG in Windows 8
The Data Protection Application Programming Interface is a cryptosystem designed by Microsoft and ... More >>
Date: 15:45:37 24.08.2012
Categories: Articles Keywords: dpapi, dpapi-ng, windows, windows 8, protected storage, vault, decrypt, secret The Right Reverend James Langstaff is urging Christians to use Bible Quotes as Passwords
English bishop James Langstaff suggests using Bible quotes instead of more conventional, simple pa ... More >>
Date: 12:56:28 09.04.2012
Categories: Articles Keywords: bible, strong, password, phrase, recover, program DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 2)
DPAPI Credential History
Credential History in DPAPI
CREDHIST data structure
CREDHIST ... More >>
Date: 16:51:23 12.03.2012
Categories: Articles Keywords: dpapi, decrypt, blob, master key, credhist, secret,reset, password DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 1)
Introduction
DPAPI architecture and security
What is DPAPI
What does DPAPI protec ... More >>
Date: 16:43:58 12.03.2012
Categories: Articles Keywords: dpapi, decrypt, blob, master key, credhist, secret,reset, password Brief Analysis of RockYou Passwords
In December 2009, the RockYou.com website was attacked by hackers. The attack was successful and r ... More >>
Date: 09:30:10 20.02.2012
Categories: Articles Keywords: password,analysis,audit,recovery,statistics Windows passwords FAQ
Q: What is password protection?
A: ... More >>
Date: 15:27:13 05.10.2010
Categories: Articles Keywords: windows,password,recover,break,crack,decrypt,extract,decode,hash,lm,nt,active directory,domain,administrator,access,reset Recovering lost Internet Explorer passwords: Theory and Practice
German translation of the article can be found here. You can translate the artic ... More >>
Date: 22:46:51 10.12.2009
Categories: Articles Keywords: internet explorer, ie, password, recovery, program, url, change, finder, forgot, find, lost, reset, cracker, remember, browser, asterisk, decrypt, autocomplete, site, web, stealer, cracker, viewer, reader, forgotten, revealer, cached, best, unhide Recovering Internet Explorer 7 - 9 passwords
You can translate the article into your native language in order to get the progra ... More >>
Date: 22:45:00 10.12.2009
Categories: Articles Keywords: internet explorer, ie, password, recover, finder, forgot, find, lost, reset, advanced, browser, asterisk, decrypt, site, web, stealer, cracker, viewer, reader, forgotten, revealer, cached, unhide, uncover, reveal, autocomplete, program, hash |