GoCrack free password cracker from FireEye

GoCrack: H υποστηρίζει ότι κάθε sysadmin χρειάζεται βοήθεια για την επιβολή κανόνων δημιουργίας κωδικών πρόσβασης σε επιχειρήσεις. Έτσι η εταιρεία ασφαλείας κυκλοφόρησε ένα open-source εργαλείο για τον έλεγχο κωδικών πρόσβασης μέσω της GPU του υπολογιστή σας.

The GoCrack tool (there is in GitHub) realizes the tasks with privilege management, so password tests don't fall into the wrong hands.GoCrack

So only those who carry out the tests or those who have it by the system or application administrator, they can see the contents of a cracking job.

"Changes to a task, viewing broken passwords, downloading a task file, and other sensitive actions are recorded and are available for control by administrators only," the company said in a blog post.

Crack engine dictionaries, rules for characters, and more are available to other users, but only the administrator can see the results or process the application.

GoCrack uses hashcat v3.6 or later and does not need an external server that has a base . The application supports LDAP or back-end authentication.

The cracker server component runs on any Linux server with Docker and NVIDIA Docker that allow GoCrack to run in a container with full access to the server GPU.

The company's future development plans include MySQL and PostgreSQP database support, UI support for file processing, auto-termination, and extensive hashcat settings.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).