|
SAMInside 2.6.5.0
Program Specifications
|
Version: |
2.6.5.0
|
Size: |
1.20 MB |
Publisher: |
InsidePro |
Date Added: |
May 28, 2007 |
License [?]: |
Shareware (USD$45.00 to buy) |
Operating System: |
Windows XP, Windows Vista, Windows NT, Windows 2008, Windows 2003, Windows 2000, Windows 7 |
Requirements: |
|
Download Links: |
Download SAMInside
|
BumperSoft Editor's Review Status:
|
|
|
|
Publisher's Description of SAMInside
" Recovery of Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7 user passwords. "
- From InsidePro
Some of its outstanding features include:
* The program has small footprint, it doesn't require the installation and can be run from a diskette, CD/DVD-disk or USB-drive.
* Includes over 10 types of data import and 6 types of password attack:
- Brute-force attack
- Distributed attack
- Mask attack
- Dictionary attack
- Hybrid attack
- Pre-calculated tables attack
* Top-speed performance on any CPU, since the recovery code completely written in Assembler.
* The application understands national character sets and properly displays non-latin Windows user names and passwords.
Data import features include:
"Import SAM and SYSTEM Registry Files" - the importing of user data from SAM registry file. If the imported SAM file is additionally encrypted by SYSKEY (enabled by default in Windows 2000/XP/2003/Vista), the program will also need the SYSTEM Windows registry file, located at the same Windows directory, where SAM file was - %SystemRoot%\System32\Config. Copies of these files may be also found in the %SystemRoot%\Repair and %SystemRoot%\Repair\RegBack folders. (Note: %SystemRoot% is the system folder of Windows OS; commonly C:\WINDOWS or C:\WINNT).
"Import SAM Registry and SYSKEY File" - the importing of user data from SAM Windows registry file using the file with the SYSKEY system key.
"Import from PWDUMP File" - the importing of user data from text file of the PWDUMP format. You can find sample files with users in the SAMInside archive.
"Import from *.LC File" - the importing of user data from files created with L0phtCrack.
"Import from *.LCP File" - the importing of user data from files created with LC+4 and LC+5.
"Import from *.LCS File" - the importing of user data from files created with LC4, LC5 and LC6.
"Import from *.HDT File" - the importing of user data from projects created with Proactive Windows Security Explorer and Proactive Password Auditor.
"Import from *.LST File" - the importing of user data from LMNT.LST files created with Cain&Abel.
"Import LM-Hashes from *.TXT File" - the importing of LM-hashes from text file.
"Import NT-Hashes from *.TXT File" - the importing of NT-hashes from text file.
"Import Local Users ..." - the importing of local user data (to do that, run the program with Administrator privileges). The program uses the following methods of obtaining local users:
" ... via LSASS" - importing local user data using a connection to the LSASS process.
" ... via Scheduler" - importing local user data using the Scheduler system utility.
The program also lets adding users with known LM/NT hashes through the dialog box (Alt+Ins).
The peak user number the application is capable of serving to is 65536.
Export features include:
"Export Users to PWDUMP File" - the exporting of all user records to a text file in the PWDUMP format. You can then open the produced file in any passwords recovery program.
"Export Selected Users to PWDUMP File" - the exporting of selected user records to a text file in the PWDUMP format.
"Export Found Passwords" - the exporting of found passwords in the "User name:Password" format.
"Export Statistics" - the exporting of current program statistics to a text file.
"Export Users to HTML" - the exporting of users to a HTML file.
Limitations in downloadable version
Only Latin capitals may be used for brute-force attack; Mask attack is unavailable; Only one table is available for attack with pre-calculated tables.
|
Share SAMInside with Friends
Tags
RELATED DOWNLOADS
(Password Tools and Managers)
|
WEEK'S TOP DOWNLOADS
(All Categories)
|
|