Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

Five password recovery tools to use in a pinch

By Jack Wallen May 23, 2012, 2:18 AM PDT

Image
1
of 9

00password_crack.jpg
00password_crack.jpg
Five password recovery tools to use in a pinch

Introduction

Introduction

ntMany people take a dim view of password recovery tools for ethical reasons — understandably so. You have a tool that can, in some cases, crack passwords on machines. But in certain situations, these tools may be the only thing that can save you from having to go as far as reinstalling the operating system.

n

ntLet’s take a look at five “free” password recovery tools. I say “free” because in some cases there are tables that must be purchased (such as rainbow tables) to break some types of passwords.

n

ntNote: If you’d prefer to view this information as a blog post, check out this entry in our Five Apps blog.

n

ntPhoto: iStockphoto.com/proxyminder

Five password recovery tools to use in a pinch

LCP

LCP

ntLCP is a user-account password recovery tool for Windows NT/2000/XP/2003. This tool can recover using a dictionary attack, brute force attack, or a hybrid dictionary/brute force attack. LCP allows you to import from a local computer, remote computer, SAM file, .LC file, LCS file, PwDump file, and Sniff file.

Five password recovery tools to use in a pinch

LCP

LCP

ntAs with many of these applications, you should avoid using your machine while LCP recovers passwords, as it will consume the majority of your machine resources for the crack.

Five password recovery tools to use in a pinch

Ophcrack

Ophcrack

ntOphcrack  is one of the most popular password recovery tools. It’s free (open source as well), cross platform, and very reliable. Ophcrack uses a solid implementation of rainbow tables that just happens to have been done by those who created the method.

Five password recovery tools to use in a pinch

Ophcrack

Ophcrack

ntOphcrack runs on Windows, Linux/UNIX, and Mac. It cracks LM and NTLM hashes; has free tables for XP, Vista, and 7; includes a brute-force module for simple passwords; offers an audit mode and a CSV export; presents real-time graphs; has a LiveCD for easier (and more efficient) recovery; and dumps and loads hashes from encrypted SAM.

Five password recovery tools to use in a pinch

Windows Key

Windows Key

ntWindows Key is simple to use, and it can reset both local (standard version) and domain admin account (Enterprise edition only) passwords. It promises a 100% recovery rate. Although Windows Key has a free trial, you’ll have to pony up for the full version (Standard $39.00 USD, Enterprise $295.00 USD) before you can really recover any passwords.

Five password recovery tools to use in a pinch

Windows Password Unlocker

Windows Password Unlocker

ntWindows Password Unlocker also creates a USB or CD that can then be booted to recover passwords.

Five password recovery tools to use in a pinch

Windows Password Unlocker

Windows Password Unlocker

ntThere are three editions of this tool: Standard ($19.95 USD), Professional ($29.95 USD), and Enterprise ($49.95 USD). Only the Enterprise and Professional editions can recover passwords. (Enterprise can even recover domain admin password.) The standard version simply removes the passwords, and it doesn’t support the USB flashdrive method.

Five password recovery tools to use in a pinch

Hash Suite

Hash Suite

ntThis is the go-to tool when you need to recover (or test) a number of password hashes. Please note: To successfully use this tool, you will need to employ a pwdump tool to gain the necessary hashes for Hash Suite to crack. Here is a list of possible pwdump tools.

  • Security
  • Account Information

    Share with Your Friends

    Five password recovery tools to use in a pinch

    Your email has been sent

Share: Five password recovery tools to use in a pinch
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Streaming media policy

    Although there are many legitimate business reasons to access streamed audio and video files — such as engaging in training, reviewing industry-related content and conducting research — there are also opportunities for misuse. This policy provides guidelines for the appropriate use of streaming media on systems and devices that access company networks. From the policy: ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    COVID-19 workplace policy

    The COVID-19 workplace policy from TechRepublic Premium describes the procedures the organization has adopted in an attempt to minimize the spread of coronavirus infections. From the policy: Purpose The purpose of the COVID-19 workplace policy is to ensure all individuals entering organization facilities understand and abide by COVID-19 protocols. The guidelines described within this policy ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Software licensing policy

    Organizations spend a fortune on software licenses every year, and a lack of management around it can result in heavy fines. This policy will help you establish guidelines to make sure you’re in compliance and that any audits will be painless. From the policy: Staying in compliance with software licenses can be quite difficult. End ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    IT hardware procurement policy

    A strong hardware procurement policy will ensure that requirements are followed and that all purchases are subject to the same screening and approval processes. This comprehensive policy covers the essential aspects of the purchasing process. From the policy: PURPOSE This policy establishes a framework for the purchase of company hardware in a fashion that will: ...

    Provided By TechRepublic Premium Published:  Feb 2023 Modified:  Feb 2023 Read More
    View This Now

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice