SAMInside
From Wikipedia, the free encyclopedia
SAMInside | |
---|---|
Screenshot of SAMInside with imported default Windows users |
|
Developed by | InsidePro |
Latest release | 2.6.0.0 / June 14, 2007 |
OS | Microsoft Windows |
Genre | Password recovery |
License | Shareware |
Website | www.insidepro.com |
This article may not meet the general notability guideline or one of the following specific guidelines for inclusion on Wikipedia: Biographies, Books, Companies, Fiction, Music, Neologisms, Numbers, Web content, or several proposals for new guidelines. If you are familiar with the subject matter, please expand or rewrite the article to establish its notability. The best way to address this concern is to reference published, third-party sources about the subject. If notability cannot be established, the article is more likely to be considered for redirection, merge or ultimately deletion, per Wikipedia:Guide to deletion. This article has been tagged since June 2008. |
SAMInside is a password recovery program for cracking lost Windows NT/2000/XP/2003 users' LM or NTLM hashed passwords. It's cracking speed is amazingly high (10 million passwords per second on a good computer) this is the result of core parts written in assembly language. Program also has multi language support and it's translated into 5 languages.
[edit] Features
This program is the first program that started to work with passwords encrypted with syskey, it supports about 10 types of importing, 4 types of exporting hashes and (currently) 6 types of password attack:
- Mask attack
- Dictionary attack
- Hybrid attack
- Attack with Rainbow tables
[edit] See also
Here are some key features of "SAMInside":
- "Import from SAM and SYSTEM registry files" - import hashes from SAM Windows registry file. If there's additional encryption by SYSKEY in the imported SAM file (it's on default enabled in Windows 2000/XP/2003), then the program will also need SYSTEM Windows registry file located at the same Windows directory there SAM file is - in the folder %SystemRoot%System32Config. Copies of these files may be also found in %SystemRoot%Repair and %SystemRoot%RepairRegBack folders. (Note: %SystemRoot% - is a system directory of OS Windows, usually folder C:WINDOWS or C:WINNT).
- "Import from SAM registry file and file with system key" - import encrypted passwords from SAM Windows registry file using file with system key SYSKEY.
- "Import from PWDUMP file" - import hashes from text file of PWDUMP program format. You can find test files with such hashes in the SAMInside program archive.
- "Import from *.LC file" - import hashes from files created by L0phtCrack program.
- "Import from *.LCP file" - import hashes from files created by LCP4/LCP5 programs.
- "Import from *.LCS file" - import hashes from files created by LC4/LC5 programs.
- "Import from *.HDT file" - import hashes from projects created by Proactive Windows Security Explorer program.
- "Import from *.LST file" - import hashes from the LMNT.LST file, created by Cain&Abel program.
- "Import from local machine ..." - import encoded passwords from the local machine (to do that launch the program with *Administrator user's rights). The program uses the following methods to get local hashes:
- " ... using LSASS" - import local hashes using connection to LSASS process.
- " ... using Scheduler" - import local hashes using system utility Scheduler
Password Cracking Software