ophcrack Package Description

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

Source: http://ophcrack.sourceforge.net/
ophcrack Homepage | Kali ophcrack Repo

  • Author: Objectif Sécurité
  • License: GPL-2.0+ with OpenSSL exception

Tools included in the ophcrack package

ophcrack – Microsoft Windows password cracker using rainbow tables (gui)
root@kali:~# ophcrack -h
ophcrack 3.7.0 by Objectif Securite (http://www.objectif-securite.ch)

Usage: ophcrack [OPTIONS]
Cracks Windows passwords with Rainbow tables

  -a              disable audit mode (default)
  -A              enable audit mode
  -b              disable bruteforce
  -B              enable bruteforce (default)
  -c config_file  specify the config file to use
  -D              display (lots of!) debugging information
  -d dir          specify tables base directory
  -e              do not display empty passwords
  -f file         load hashes from the specified file (pwdump or session)
  -g              disable GUI
  -h              display this information
  -i              hide usernames
  -I              show usernames (default)
  -l file         log all output to the specified file
  -n num          specify the number of threads to use
  -o file         write cracking output to file in pwdump format
  -p num          preload (0 none, 1 index, 2 index+end, 3 all default)
  -q              quiet mode
  -r              launch the cracking when ophcrack starts (GUI only)
  -s              disable session auto-saving
  -S session_file specify the file to use to automatically save the progress of the search
  -u              display statistics when cracking ends
  -t table1[,a[,b,...]][:table2[,a[,b,...]]]
                  specify which table to use in the directory given by -d
  -v              verbose
  -w dir          load hashes from encrypted SAM file in directory dir
  -x file         export data in CSV format to file


Example:    ophcrack -g -d /path/to/tables -t xp_free_fast,0,3:vista_free -f in.txt

        Launch ophcrack in command line using tables 0 and 3 in
        /path/to/tables/xp_free_fast and all tables in /path/to/tables/vista_free
        and cracks hashes from pwdump file in.txt
ophcrack-cli – Microsoft Windows password cracker using rainbow tables (cmdline)
root@kali:~# ophcrack-cli -h
ophcrack 3.7.0 by Objectif Securite (http://www.objectif-securite.ch)

Usage: ophcrack [OPTIONS]
Cracks Windows passwords with Rainbow tables

  -a              disable audit mode (default)
  -A              enable audit mode
  -b              disable bruteforce
  -B              enable bruteforce (default)
  -c config_file  specify the config file to use
  -D              display (lots of!) debugging information
  -d dir          specify tables base directory
  -e              do not display empty passwords
  -f file         load hashes from the specified file (pwdump or session)
  -g              disable GUI
  -h              display this information
  -i              hide usernames
  -I              show usernames (default)
  -l file         log all output to the specified file
  -n num          specify the number of threads to use
  -o file         write cracking output to file in pwdump format
  -p num          preload (0 none, 1 index, 2 index+end, 3 all default)
  -q              quiet mode
  -r              launch the cracking when ophcrack starts (GUI only)
  -s              disable session auto-saving
  -S session_file specify the file to use to automatically save the progress of the search
  -u              display statistics when cracking ends
  -t table1[,a[,b,...]][:table2[,a[,b,...]]]
                  specify which table to use in the directory given by -d
  -v              verbose
  -w dir          load hashes from encrypted SAM file in directory dir
  -x file         export data in CSV format to file


Example:    ophcrack -g -d /path/to/tables -t xp_free_fast,0,3:vista_free -f in.txt

        Launch ophcrack in command line using tables 0 and 3 in
        /path/to/tables/xp_free_fast and all tables in /path/to/tables/vista_free
        and cracks hashes from pwdump file in.txt

ophcrack Usage Examples

Menu