Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Cain and Abel (software)

Index Cain and Abel (software)

Cain and Abel (often abbreviated to Cain) is a password recovery tool for Microsoft Windows. [1]

54 relations: Aircrack-ng, ARP spoofing, Avast, Cisco IOS, Cisco PIX, Crack (password software), CRAM-MD5, DaveGrohl, Freeware, Hash function, Hashcat, HMAC, Internet Key Exchange, IP address, John the Ripper, Kerberos (protocol), L0phtCrack, LAN Manager, List of digital forensics tools, Local Security Authority Subsystem Service, MAC address, Malware, MD2 (cryptography), MD4, MD5, Microsoft Security Essentials, Microsoft SQL Server, Microsoft Windows, MySQL, NT LAN Manager, Open Shortest Path First, Ophcrack, Oracle Database, Packet analyzer, Password, Password cracking, Post Office Protocol, Pre-shared key, RADIUS, Rainbow table, RainbowCrack, RIPEMD, Routing Information Protocol, Security hacker, Session Initiation Protocol, SHA-1, SHA-2, Traceroute, Triple DES, Virtual Network Computing, ..., Virtual Router Redundancy Protocol, Voice over IP, White hat (computer security), Wired Equivalent Privacy. Expand index (4 more) »

Aircrack-ng

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.

New!!: Cain and Abel (software) and Aircrack-ng · See more »

ARP spoofing

In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.

New!!: Cain and Abel (software) and ARP spoofing · See more »

Avast

Avast is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic.

New!!: Cain and Abel (software) and Avast · See more »

Cisco IOS

Cisco IOS (originally Internetwork Operating System) is a family of software used on most Cisco Systems routers and current Cisco network switches.

New!!: Cain and Abel (software) and Cisco IOS · See more »

Cisco PIX

Cisco PIX (Private Internet eXchange) was a popular IP firewall and network address translation (NAT) appliance.

New!!: Cain and Abel (software) and Cisco PIX · See more »

Crack (password software)

Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack.

New!!: Cain and Abel (software) and Crack (password software) · See more »

CRAM-MD5

In cryptography, CRAM-MD5 is a challenge-response authentication mechanism (CRAM) based on the HMAC-MD5 algorithm.

New!!: Cain and Abel (software) and CRAM-MD5 · See more »

DaveGrohl

DaveGrohl is a brute-force password cracker for Mac OS X. It was originally created in 2010 as a password hash extractor but has since evolved into a standalone or distributed password cracker.

New!!: Cain and Abel (software) and DaveGrohl · See more »

Freeware

Freeware is software that is available for use at no monetary cost.

New!!: Cain and Abel (software) and Freeware · See more »

Hash function

A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

New!!: Cain and Abel (software) and Hash function · See more »

Hashcat

Hashcat is the self-proclaimed world’s fastest password recovery tool.

New!!: Cain and Abel (software) and Hashcat · See more »

HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: Cain and Abel (software) and HMAC · See more »

Internet Key Exchange

In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite.

New!!: Cain and Abel (software) and Internet Key Exchange · See more »

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

New!!: Cain and Abel (software) and IP address · See more »

John the Ripper

John the Ripper is a free password cracking software tool.

New!!: Cain and Abel (software) and John the Ripper · See more »

Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

New!!: Cain and Abel (software) and Kerberos (protocol) · See more »

L0phtCrack

L0phtCrack is a login & password auditer and recovery application originally produced by Mudge from L0pht Heavy Industries.

New!!: Cain and Abel (software) and L0phtCrack · See more »

LAN Manager

LAN Manager was a Network operating system (NOS) available from multiple vendors and developed by Microsoft in cooperation with 3Com Corporation.

New!!: Cain and Abel (software) and LAN Manager · See more »

List of digital forensics tools

During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools.

New!!: Cain and Abel (software) and List of digital forensics tools · See more »

Local Security Authority Subsystem Service

Local Security Authority Subsystem Service (LSASS) is a process in Microsoft Windows operating systems that is responsible for enforcing the security policy on the system.

New!!: Cain and Abel (software) and Local Security Authority Subsystem Service · See more »

MAC address

A media access control address (MAC address) of a device is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment.

New!!: Cain and Abel (software) and MAC address · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Cain and Abel (software) and Malware · See more »

MD2 (cryptography)

The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.

New!!: Cain and Abel (software) and MD2 (cryptography) · See more »

MD4

The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.

New!!: Cain and Abel (software) and MD4 · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Cain and Abel (software) and MD5 · See more »

Microsoft Security Essentials

Microsoft Security Essentials (MSE) is an antivirus software (AV) that provides protection against different types of malicious software, such as computer viruses, spyware, rootkits, and trojan horses.

New!!: Cain and Abel (software) and Microsoft Security Essentials · See more »

Microsoft SQL Server

Microsoft SQL Server is a relational database management system developed by Microsoft.

New!!: Cain and Abel (software) and Microsoft SQL Server · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Cain and Abel (software) and Microsoft Windows · See more »

MySQL

MySQL ("My S-Q-L") is an open-source relational database management system (RDBMS).

New!!: Cain and Abel (software) and MySQL · See more »

NT LAN Manager

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.

New!!: Cain and Abel (software) and NT LAN Manager · See more »

Open Shortest Path First

Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.

New!!: Cain and Abel (software) and Open Shortest Path First · See more »

Ophcrack

Ophcrack is a free open source (GPL licensed) program that cracks Windows log-in passwords by using LM hashes through rainbow tables.

New!!: Cain and Abel (software) and Ophcrack · See more »

Oracle Database

Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is a multi-model database management system produced and marketed by Oracle Corporation.

New!!: Cain and Abel (software) and Oracle Database · See more »

Packet analyzer

A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.

New!!: Cain and Abel (software) and Packet analyzer · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Cain and Abel (software) and Password · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: Cain and Abel (software) and Password cracking · See more »

Post Office Protocol

In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a server in an Internet Protocol (IP) network.

New!!: Cain and Abel (software) and Post Office Protocol · See more »

Pre-shared key

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

New!!: Cain and Abel (software) and Pre-shared key · See more »

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

New!!: Cain and Abel (software) and RADIUS · See more »

Rainbow table

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.

New!!: Cain and Abel (software) and Rainbow table · See more »

RainbowCrack

RainbowCrack is a computer program which generates rainbow tables to be used in password cracking.

New!!: Cain and Abel (software) and RainbowCrack · See more »

RIPEMD

RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is a family of cryptographic hash functions developed in Leuven, Belgium, by Hans Dobbertin, Antoon Bosselaers and Bart Preneel at the COSIC research group at the Katholieke Universiteit Leuven, and first published in 1996.

New!!: Cain and Abel (software) and RIPEMD · See more »

Routing Information Protocol

The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric.

New!!: Cain and Abel (software) and Routing Information Protocol · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Cain and Abel (software) and Security hacker · See more »

Session Initiation Protocol

The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, as well as in instant messaging over Internet Protocol (IP) networks.

New!!: Cain and Abel (software) and Session Initiation Protocol · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Cain and Abel (software) and SHA-1 · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Cain and Abel (software) and SHA-2 · See more »

Traceroute

In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.

New!!: Cain and Abel (software) and Traceroute · See more »

Triple DES

In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.

New!!: Cain and Abel (software) and Triple DES · See more »

Virtual Network Computing

In computing, Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer.

New!!: Cain and Abel (software) and Virtual Network Computing · See more »

Virtual Router Redundancy Protocol

The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts.

New!!: Cain and Abel (software) and Virtual Router Redundancy Protocol · See more »

Voice over IP

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

New!!: Cain and Abel (software) and Voice over IP · See more »

White hat (computer security)

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

New!!: Cain and Abel (software) and White hat (computer security) · See more »

Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.

New!!: Cain and Abel (software) and Wired Equivalent Privacy · See more »

Redirects here:

Cain (Software), Cain (software), Cain and abel (software).

References

[1] https://en.wikipedia.org/wiki/Cain_and_Abel_(software)

OutgoingIncoming
Hey! We are on Facebook now! »