Tuesday, February 28, 2017

Forgot Password? Hack yourself

Passwords are the torment of the digital age. We are constantly dependent on them, but rarely manage to curb them. With the immense number of online accounts to secure with them, the choice of passwords either suffers from security or convenience. We’ll show you how to recover lost passwords.


Password forgetting option does not always help


According to a survey conducted by Bilendi GmbH on behalf of Web.de, 58.8 per cent of respondents report a single password for all their services. Birth dates and names are still in full swing, which makes hackers and account hijackers easy, of course. But even if no one takes it, forgetfulness suffices as a reason to stand in front of a closed door. 62.3 percent of the interviewees remember their passwords without storing them or at least writing them down and making them secure (Source: Web.de study).


The perfect password


While we are sure that our readers are not a majority of them, the tips are helpful - whether it is to help prevent bad luck or to show friends and family members how to properly manage passwords


Software Help


The helpful "I forgot my password" link is not always a good solution. If the online account is linked to an e-mail address that is no longer accessible, the link to reset the password will go blank.


In the Internet cache hidden


The still popular security query as a passport statement can even turn out to be a security risk. Questions such as "What is the name of your old elementary school?" Can be answered on the one hand with little research effort directly from the outside. On the other hand, it is easier to remember the answer than the exact spelling: "Was it Erich-Kästner-Grundschule 'or' Erich Kästner Grundschule? '"


It would be much easier to forget your password. If this is still long and complex enough and can be modulated for all applications - and, above all, easy to remember - you would not have to bother with it any more.


It takes only a little practice: Take a passphrase, for example the first sentence of your favorite book, and write down the initial letters. Then add some special characters. This is the cornerstone of your password. The more often you use passwords with this foundation, the more skilled you are to write the letter series.


However, in order for the password to be used simultaneously for different Internet services, you now have to append a term that you connect to the service (not the name of the service itself). A sample password could look like this: Nmiepjihuwlg§ $% likesmir (for Facebook)


To ensure you do not forget the various iterations for the respective services, you can use free password managers such as LastPass or Keepass.


LastPass manages all your passwords, encrypts them locally and synchronizes them on all PCs or mobile devices.


However, anyone who still uses imperfect passwords (or if they are not otherwise accessible) will find more complex software solutions. Be careful! The programs presented here are hacking tools, which may be blocked by your anti-virus software, as long as you do not add exceptions. In addition, you can only use these tools on your own documents, your own programs, and your own identities in online networks - you can make a criminal offense against third parties!


The Elcomsoft Internet Password Breaker cleverly sets up where the passwords leave their mark. Facebook and similar pages are still hidden on your system, even if they are not directly visible. Internet Password Breaker reads these resources and saves your passwords.


However, this may only work for web pages that you visit frequently, as the browser cache is periodically emptied. Offline, the program supports POP3 IMAP, SMTP, and NNTP passwords for many e-mail clients, including: Outlook.


Decrypt Office files


Rechenpower is necessary when it comes to long and complex passwords and the process should not take months. Distributed Password Recovery queries a database of dictionaries and simultaneously executes brute-force attacks, meaning systematic queries of all possible combinations of letters and special characters.


Advanced Office Password Recovery is also provided by Elcomsoft and helps you rescue Office documents. To do this, simply select the appropriate Word, Excel or Access file, and the rest will do the rest by itself. It will first read out temporary folders and then go over to password and brute force attacks like Password Recovery Code>



Suspended with Windows


If the password for Windows is no longer accessible, you do not have to reinstall the operating system from despair. Instead, you might prefer to crack your system with the free Ophcrack Live CD. A prerequisite for this is another PC.


Load the ISO file and burn it. Then place the DVD in the locked PC and restart it. In order for the computer to boot from the DVD, you must set this in the BIOS. Ophcrack scans the computer for Windows users and passwords and compiles a list.


Expensive Microsoft software have the most users in view and so in case of emergency the reinstallation is always an option. However, with other Noname software, the product key may be missing.


Software accesses from the registry


Lesetipp


With the Magical Jelly Bean Keyfinder, these keys can be found in most cases - but only as long as the unlocked program, which is to be installed again, still has on the computer. The Keyfinder reads the Windows registry for over 8,000 supported programs. The tool is not an illegal key generator because it only finds keys that were already used on the computer.

No comments:

Post a Comment