Home > Software > Proactive Password Auditor
Proactive Password Auditor
Posted on Wednesday, June 15, 2011 by Arman Zulhajar

Examine Network Security
Proactive Password Auditor helps network administrators to examine the security of their networks by executing an audit of account passwords. By exposing insecure passwords, Proactive Password Auditor demonstrates how secure a network is under attack.
Features and Benefits
* Improved Windows 7 compatibility (with both 32-bit and 64-bit versions)
* Increased speed on Intel Core i7 processors* Password cache
* Supports indexed rainbow tables (available at www.freerainbowtables.com)
* Determine how secure your corporate network is
* Test the strength of passwords protecting user accounts
* Recover account passwords
* Perform attacks with brute force, by the dictionary, or with a mask from inside or outside of your network
* Recover up to 95% of passwords in just minutes from the inside with Rainbow attack
How Secure Is Your Network?
A single weak password exposes your entire network to an external threat. Password-hacking is one of the most critical and commonly exploited network security threats. Network users employ short and simple passwords that are easy to remember, but are also easy to break. They often use repeating characters, simple words and names for easier memorizing. Making them use computer-generated passwords that consist of random characters will only make the problem more severe, as the users will write the passwords down on the proverbial yellow stickers. There is more information available on the issue in the Elcomsoft whitepaper Proactive Is Better than Reactive: Testing Password Safety – a Key to Securing a Corporate Network.
Network administrators are also part of the problem, as they may forget purging terminated employees, forcing people to change passwords often, or locking out the users after a certain number of failed login attempts.
Network Security Policies
Weak passwords are easy to break, while complex passwords are difficult to memorize. Having an elaborate security policy is the only way to ensure the security of your network. Force network users to change passwords regularly, and audit the network after every change. Did it take Proactive Password Auditor 30 days to break a password when you performed the last audit? Then examine your network at least once a month to ensure ongoing security.
Network Security Audit
Proactive Password Auditor examines the security of your network by attempting to break into the network. It tries common attacks on the account passwords in an attempt to recover a password of a user account.
Proactive Password Auditor allows carrying out a password audit within a limited period of time. If it is possible for Proactive Password Auditor to recover a password within a reasonable time, the entire network cannot be considered secure.
Recover Account Passwords
Network administrators can use Proactive Password Auditor to recover Windows account passwords, too. Proactive Password Auditor analyzes user password hashes and recovers plain-text passwords, allowing accessing their accounts, including EFS-encrypted files and folders.
Types of Attacks
Proactive Password Auditor uses several basic methods for testing and recovering passwords, including brute force attack, mask attack, dictionary search, and Rainbow table attack. The Rainbow attack is particularly effective, as it uses pre-computed hash tables that allow finding up to 95% of passwords in just minutes instead of days or weeks. Fortunately, the Rainbow attack cannot be performed from outside of your network! You’ll need either administrative access or a dump file exported by Elcomsoft System Recovery.
Compatibility with Other Elcomsoft Products
Proactive Password Auditor supports off-line recovery of account passwords by analyzing dump files saved by Elcomsoft System Recovery, local Registry, binary Registry files (SAM and SYSTEM), memory of the local computer, and memory of remote computers (Domain Controllers), including ones running Active Directory.
The off-line recovery speed can be greatly enhanced when using Elcomsoft Distributed Password Recovery. Thanks to the patent-pending GPU acceleration technology available in Elcomsoft Distributed Password Recovery, the recovery using a single PC is up to 50 times faster as compared to CPU-only mode and other password-recovery applications. Adding more computers increases the recovery speed linearly with zero scalability overhead.
Compatibility
Proactive Password Auditor supports Windows NT4, 2000, XP, Vista, Windows Server 2003, and Windows Server 2008.
Unregistered (trial) version can be used during 30 days after installation (although it doesn't expire, actually) and has some limitations.
Download PPA Download Proactive Password Auditor for free
Source : www.crackpassword.com
Category Article download sofware, password auditor, Proactive Password Auditor, Software
Random Posts
-
In Angry Birds 2-14, you have 4 white Angry Birds that can drop explosive eggs. You must beat 4 pigs to pass this level. If you're look...
-
Using WiFi Access Point (WAP) is actually tricky. If you use a different modem and WAP brands such as TP Link modem and WAP SMC or Asus br...
-
Angry Birds 5-12 walkthroughs are so useful for you who need idea to beat Angry Birds 5-12 Mighty Hoax. Maybe, Angry Birds level 5-12 is ha...
-
My apologies to the vast majority who voted for a facebook page. I have read through the privacy policy on facebook and rushed to delete my ...
-
I have received a couple of emails asking about hair thinning and hair loss (not relaxer related but for natural hair). I am happy to do the...
Powered by Blogger.
Blog Archive
-
▼
2011
(3255)
-
▼
June
(184)
- Ghost Scepter - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - Facebook Games News
- Etheral Blade - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Isla Dorada Episode 1: The Sands of Ephranis [BETA]
- Midsummer creatures
- Download Dota Ringtone for Your Cellphone
- Google Alert - FrontierVille Latest Cheats
- Oddly Enough Pied Piper [BETA]
- Sphera [BETA]
- 4 Elements 2 [BETA]
- Cradle Of Egypt [BETA]
- Ninja Puzzle [FINAL]
- Urn of Shadows
- Mahjongg Artifacts 2 [FINAL]
- Nanda's Island [FINAL]-BFG
- QuadSmash [FINAL]
- The Microbie Story [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Herofy [FINAL]
- Garden Spirits [BETA]
- Google Alert - Facebook Games News
- Khadgar's Pipe of Insight
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Sandra Fleming Chronicles: The Crystal Skull [BFG-...
- Differences between HTML 4 and HTML5
- Increase Traffic to Your Blog
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Tales From The Dragon Mountain: The Strix [FINAL]
- Grim Facade: Mystery of Venice Collector’s Edition...
- Google Alert - FrontierVille Latest Cheats
- Camy Adventures - Episode 1 [FINAL]
- Google Alert - Facebook Games News
- What to Do When a Laptop is Stolen???
- Review: Cisco RV220W Wireless-N Network Security F...
- The Fall Trilogy: Chapter 3 - Revelation [FINAL]
- New Dota Hero: Ymir - Tuskarr
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Val'Gor 2: The Beginning [FINAL]
- Jessica's 2 Dash Pack [FINAL]
- Virtual Farm 2 [FINAL]
- Jessica's Bow Wow Bistro [FINAL]
- Energy Vampires: Strange Comments and Emails
- Dota 6.70 Map Free for Download
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Ghost Towns: The Cats Of Ulthar [BETA]
- Mystery Valley: Extended Edition [FINAL]
- Blossoms at home
- Smoke of Deceit - New Dota Item on Dota 6.70
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- How Public Key Cryptography Works ?
- Protecting Your Sensitive Information with Encryption
- Ancient Janggo of Endurance - New Dota Item on Dot...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Juliet's Fashion Empire [BETA1]
- Research time: What questions do you want answered?
- Medallion of Courage - New Dota Item on Dota 6.70
- The pilot outfit
- Veil of Discord - Dota Item
- Secrets of the Dark: Temple of Night Collector's E...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Hello!
- Classic Fishdom 2 in 1 Pack [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Short vs Long
- Doodling while rendering....Looks like some animal...
- Grand Magnus (Rubick) - Dota Hero
- Hide and Secret 4: The Lost World [FINAL]
- Death Under Tuscan Skies: A Dana Knightstone Novel...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- The perfect light conditions
- Short Natural Hair: The Flat Twist
- "7 Secrets of Internet Millionaires"
- Proactive Password Auditor
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Puppy Sanctuary [BFG-FINAL]
- Bicycle Skat [FINAL]
- The Timebuilders 2: Caveman's Prophecy [FINAL]
- Echoes Of The Past 3: The Citadels Of Time [BETA]
- Google Alert - Facebook Games News
- Short Natural Hairstyles: Curly Chellez
- Download Dota Map 6.72c
- Angry Birds 1.5.2 [FINAL]
- It's not enough!
-
▼
June
(184)