Cracking tools
Today, hashing is a basic security mechanism of most IT services. Overall, hashing transforms data of arbitrary length into the output bit string of a fixed length in a non-recoverable way (that is why it also called a one-way conversion). Hashes are often used for authentication purposes (to store and compare hashes of user passwords instead of storing passwords in clear text what is insecure), for integrity control (checksums).
Nowadays, we cannot imagine technologies that do not use encryption. Therefore, the question of the restoration of hashed data is one of the most important in today's IT security world. In this section, we will look at some of the popular tools that can be useful in performing this security analysis.
John The Ripper
John The Ripper (JTR) is a free program designed to recover passwords from their hashes. The main purpose of the program is to audit weak passwords on Unix systems. The program can also perform an audit of NTLM hashes (Microsoft Windows...