Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
Password Recovery
OS passwords
Windows NT/2000/XP/2003/Vista/7
Windows NTFS (EFS)
Windows 95/98/ME
Microsoft Office
MS Word
Other Microsoft products
Internet Explorer
Outlook Express, Outlook, Internet Mail
SQL Server
Documents, Office Applications
Adobe Acrobat PDF
Corel WordPerfect Office: WordPerfect, QuattroPro, Paradox
Lotus SmartSuite: Organizer, WordPro, 1-2-3, Approach
Intuit Quicken, Quicken Lawyer, QuickBooks
E-mail (POP3, IMAP): Microsoft Outlook Express, Outlook, Internet Mail; Eudora, The Bat!, Netscape Mail, ...
Instant Messengers: ICQ, AOL, Yahoo!, Hotmail & MSN, Skype, ...

Hash Suite by Alain Espinosa
Windows XP/2003/Vista/7, shareware, free trial, $39.95+

Hash Suite is a very efficient auditing tool for Windows password hashes (LM, NTLM, and Domain Cached Credentials also knows as DCC or MSCash). It is very fast, yet it has modest memory requirements even when attacking a million of hashes at once. The GUI is simple, yet uses modern features offered by Windows 7. Besides the password security auditing program itself, there's an included reports engine that generates reports in multiple formats, including PDF. (The reports engine requires free Java VM from Oracle to be installed.)

Proactive System Password Recovery by ElcomSoft
Windows, shareware, free trial, $79
Purchase the full registered version

Proactive System Password Recovery (PSPR; formerly known as Advanced Windows Password Recovery) is a program to recover most types of Windows passwords:

  • Windows 95/98/ME logon password (instantly when user is logged on)
  • Windows NT4/2000 logon password (instantly when user is logged on and has Admin rights)
  • Windows 95/98/ME/NT4/2000/XP/2003 auto logon password (instantly)
  • Windows NT/2000/XP/2003/Vista/2008/Windows 7 user passwords (fast with advanced attacks)
  • .NET Passport password
  • Windows XP stored user passwords (multiple credentials)
  • screensaver password
  • RAS and dial-up passwords
  • passwords to VPN (Virtual Private Network) connections
  • passwords and access rights to shared resources

Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password history hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files, and decrypt product ID and CD key for Windows and Microsoft Office installations.

Elcomsoft System Recovery by ElcomSoft
$49 Basic / $199 Standard / $399 Professional Edition

This is a boot disk application that makes it easy to access your computer's Windows password settings. If you're locked out of your computer, Elcomsoft System Recovery will give you access and let you troubleshoot problems that are preventing you from running Windows. With this program, it is simple to reset and change the passwords of any of the local accounts, detect accounts with empty passwords, and assign Administrator privileges to any user account. It's easy to enable or unlock accounts that have been disabled or locked.

Proactive Password Auditor by ElcomSoft
Windows (both 32- and 64-bit), shareware, free trial
$299 for 20 user accounts
$599 for 100 user accounts
$999 for 500 user accounts
$1,499 for 2500 user accounts
$4,999 for 25000 user accounts

Proactive Password Auditor (PPA; formerly Proactive Windows Security Explorer) is a password security test tool designed to allow Windows systems administrators to identify and close security holes in their networks.

Proactive Password Auditor helps secure networks by executing an audit of account passwords, and exposing insecure account passwords. If it is possible to recover a password within a reasonable time, the password is considered insecure.

An administrator can also use this program to recover any lost password and access a user's Windows account. Proactive Password Auditor works by analyzing user password hashes and recovering plain-text passwords.

The software supports several different methods of obtaining password hashes for further attack/audit: from dump files generated by tools like pwdump (listed below on this page), Registry of local computer, binary Registry files (SAM and SYSTEM), memory of local computer, and memory of remote computers (Domain Controllers), including ones running Active Directory. It can use brute-force and dictionary attacks on LM and NTLM password hashes, effectively optimized for speed.

John the Ripper by Openwall Project
Unix & Mac OS X / Windows / other, free (GPL v2)

John the Ripper is primarily a Unix password cracker, but it also supports LM hashes of Windows systems (case insensitive, DES-based) and, in "Pro" and "jumbo", NTLM hashes (case sensitive, MD4-based). Please note that it is a command-line (console) application; there's no GUI.

Please refer to the Unix password crackers page of this website for more information on John the Ripper.

pwdump by Jeremy Allison
Windows NT, free (permissive BSD and GPL-compatible Open Source license)
Download local copy of pwdump (49 KB)

This handy utility dumps the password database of an NT machine that is held in the NT registry (under HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Users) into a valid smbpasswd format file (which is understood by practically all Windows password security auditing tools).

This is the original pwdump program. It is mostly of historical value these days. You will likely want to use a newer reimplementation such as pwdump6 instead. You might also be interested in our file archive with local copies of many pwdump-like and pwdump-related programs.

pwdump2 by Todd Sabin of Bindview
Windows NT/2000, free (GPL v2)
Download local copy of pwdump2 (46 KB)

This is an application which dumps the password hashes from NT's SAM database, whether or not SYSKEY is enabled on the system. NT Administrators can now enjoy the additional protection of SYSKEY, while still being able to check for weak users' passwords. The output follows the same format as the original pwdump (by Jeremy Allison) and can be used as input to password crackers. You need the SeDebugPrivilege for it to work. By default, only Administrators have this right, so this program does not compromise NT security.

pwdump3 and pwdump3e by Phil Staubs and Erik Hjelmstad of PoliVec, Inc.
Windows NT/2000, free (GPL v2)
Download local copies of pwdump3 version 2 (87 KB) and pwdump3e (217 KB)

pwdump3 enhances the existing pwdump and pwdump2 programs developed by Jeremy Allison and Todd Sabin, respectively. pwdump3 works across the network and whether or not SYSKEY is enabled. Like the previous pwdump utilities, pwdump3 does not represent a new exploit since administrative privileges are still required on the remote system. One of the largest improvements with pwdump3 over pwdump2 is that it allows network administrators to retrieve hashes from a remote NT system.

pwdump3e provides enhanced protection of the password hash information by encrypting the data before it is passed across the network. It uses Diffie-Hellman key agreement to generate a shared key that is not passed across the network, and employs the Windows Crypto API to protect the hashes.

pwdump4 by bingle
Windows NT/2000, free (GPL v2)
Download local copy of pwdump4 (72 KB)

pwdump4 is an attempt to improve upon pwdump3. It might work in cases when pwdump3 fails (and vice versa).

pwdump5 by AntonYo!
Windows NT/2000/XP/2003, free
Download local copy of pwdump5 (28 KB)

pwdump5 is an application that dumps password hashes from the SAM database even if SYSKEY is enabled on the system. If SYSKEY is enabled, the program retrieves the 128-bit encryption key, which is used to encrypt/decrypt the password hashes.

pwdump6 by fizzgig
Windows 2000/XP/2003/Vista, free (GPL v2)
Download local copy of pwdump6 1.7.2 in ZIP (1268 KB) or tar.bz2 format (1103 KB)

pwdump6 is a significantly modified version of pwdump3e. This program is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether SYSKEY is enabled. It is also capable of displaying password histories if they are available. Currently, data transfer between the client and target is NOT encrypted, so use this at your own risk if you feel eavesdropping may be a problem.

pwdump7 by Andres Tarasco Acuna
Windows NT family (up through XP or Vista?), free
Download local copy of pwdump7 revision 7.1 (505 KB)

pwdump7 works with its own filesytem driver (from technology) so users with administrative privileges are able to dump directly from disk both SYSTEM and SAM registry hives. Once dumped, the SYSKEY key will be retrieved from the SYSTEM hive and then used to decrypt both LanMan and NTLM hashes and dump them in pwdump like format.

Quarks PwDump by Sebastien Kaczmarek
Windows XP/2003/Vista/7/2008/8, free (GPL v3)
Source code on GitHub (no pre-compiled binary)

Quarks PwDump is new open source tool to dump various types of Windows credentials: local account, domain accounts, cached domain credentials, and bitlocker. The tool is currently dedicated to work live on operating systems, thereby limiting the risk of undermining their integrity or stability. It requires administrator privileges and is still in beta test.

Offline NT Password & Registry Editor by Petter Nordahl-Hagen
Windows NT/2000/XP/2003/Vista/7 (32- and 64-bit), freeware

This is an utility (available in the form of bootable floppy and CD images) to reset the password of any user that has a valid (local) account on your NT system, by modifying the password hash in the registry's SAM file. You do not need to know the old password to set a new one.

The editor works offline, that is, you have to shutdown your computer and boot off a floppy disk or a CD. The boot disks use Linux as the OS and include stuff to access NTFS partitions and scripts to glue the whole thing together.

This will also work with SYSKEY, including the option to turn it off.

Quick Comment:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ