Proactive Password Auditor 2.04

License: Free Trial ‎File size: N/A
‎Users Rating: 5.0/5 - ‎5 ‎votes

Audit security policies, examine network security and recover account passwords with Proactive Password Auditor. Find out exactly how secure your network is by running a full-scale attack on account passwords. By recovering exposing insecure passwords, Proactive Password Auditor determines the security of your network. Not all security policies are equally secure. A single password that is easy to break becomes the weak link in the chain that compromises security of the entire network. It is common for corporate users to use passwords too short or too simple. These passwords are easy to remember, but essentially insecure. Proactive Password Auditor determines the security of your network by attempting to break into a network by recovering one of the passwords. If just one account is unlocked within certain time, this demonstrates vulnerability of the entire network. If the network withstands the attack for the period of time between password expirations, the password security policy is considered strong enough. Recovering lost and forgotten passwords to user accounts is another purpose of Proactive Password Auditor. By analyzing password hashes and recovering plain-text passwords, Proactive Password Auditor makes it possible to access and log in to user accounts, exposing the EFS-encrypted files and folders. A wide range of available attacks from dictionary to brute force makes it possible to recover passwords over the network, while the Rainbow attack recovers up to 95% of passwords in a matter of just minutes. Fortunately, the Rainbow attack cannot be executed from the outside! Proactive Password Auditor can analyze Registry binaries and extracted dump files, allowing for off-line password recovery. Proactive Password Auditor runs on Windows NT4, 2000, XP, Vista, Windows Server 2003, and Windows Server 2008.

VERSION HISTORY

  • Version 2.04 posted on 2014-11-26
    Bugfixes
  • Version 1.60 posted on 2006-02-02
    New in version 1.60: On LM hashes, the program works 1.5 times faster; brute-force and mask attacks (LM and NTLM) are now multi-threaded for better performance multi-CPU systems; multilingual user interface has been implemented; better support of Windows Vista; many other improvements.

Program Details

EULA

END USER LICENSE AGREEMENT NOTICE TO USER: THIS IS AN AGREEMENT GOVERNING YOUR USE OF ELCOMSOFT SOFTWARE, FURTHER DEFINED HEREIN AS "PRODUCT," AND THE LICENSOR OF THE PRODUCT IS WILLING TO PROVIDE YOU WITH ACCESS TO THE PRODUCT ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS AND CONDITIONS CONTAINED IN THIS AGREEMENT. BELOW, YOU ARE ASKED TO ACCEPT THIS AGREEMENT AND CONTINUE TO INSTALL OR, IF YOU DO NOT WISH TO ACCEPT THIS AGREEMENT, TO DECLINE THIS AGREEMENT, IN WHICH CASE YOU WILL NOT BE ABLE TO INSTALL OR OPERATE THE PRODUCT. BY INSTALLING THIS PRODUCT YOU ACCEPT ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. This Electronic End User License Agreement (the "Agreement") is a legal agreement between you (either an individual or an entity), the licensee, and ElcomSoft Co. Ltd. and its affiliates (collectively, the "Licensor"), regarding the Licensor's software, as applicable pursuant to a valid license, you are about to download and/or other related services, including without limitation a) all of the contents of the files, disk(s), CD-ROM(s) or other media with which this Agreement is provided and including all forms of code, such as source code and object code, (the "Software"), b) all successor upgrades, modified versions, modified modules, revisions, patches, enhancements, fixes, modifications, copies, additions or maintenance releases of the Software, if any, licensed to you by the Licensor (collectively, the "Updates"), and c) related user documentation and explanatory materials or files provided in written, "online" or electronic form (the "Documentation" and together with the Software and Updates, the "Product"). You are subject to the terms and conditions of this End User License Agreement whether you access or obtain the Product directly from the Licensor, or through any other source. For purposes hereof, "you" means the individual person installing or using the Product on his or her own behalf; or, if the Product is being downloaded or installed on behalf of an organization, such as an employer, "you" means the organization for which the Product is downloaded or installed, then the person accepting this agreement represents hereby that such organization has authorized such person to accept this agreement on the organization's behalf. For purposes hereof the term "organization," without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority. By accessing, storing, loading, installing, executing, displaying, copying the Product into the memory of a Client Device, as defined below, or otherwise benefiting from using the functionality of the Product ("Operating"), you agree to be bound by the terms and conditions of this Agreement. If you do not agree to the terms and conditions of this Agreement, the Licensor is unwilling to license the Product to you. In such event, you may not Operate or use the Product in any way. BEFORE YOU "I AGREE" BUTTON", PLEASE CAREFULLY READ THE TERMS AND CONDITIONS OF THIS AGREEMENT, AS SUCH ACTIONS ARE A SYMBOL OF YOUR SIGNATURE AND BY CLICKING ON THE "I AGREE" BUTTON, YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE "CANCEL" BUTTON AND THE PRODUCT WILL NOT BE INSTALLED ON YOUR CLIENT DEVICE, AS SUCH TERM IS DEFINED BELOW. For your reference, you may refer to the copy of this Agreement that can be found in the Help for the Software. You may also receive a copy of this Agreement by contacting Licensor at: [email protected]. Full text available here: http://www.elcomsoft.com/eula.html