Nytro Posted September 27, 2013 Report Posted September 27, 2013 Codetective Analysis Tool[TABLE][TR][TH=bgcolor: #E6EBFF, align: left]Author: [/TH][TD] Francisco Gama Tabanez Ribeiro [/TD][/TR] [TR] [TH=bgcolor: #E6EBFF, align: left] Website: [/TH][TD=colspan: 2] http://www.digitalloft.org [/TD][/TR] [TR] [TH=bgcolor: #E6EBFF, align: left] Current version: [/TH][TD=colspan: 2] 0.7 [/TD][/TR] [TR] [TH=bgcolor: #E6EBFF, align: left] Last updated: [/TH][TD=colspan: 2] March 26, 2012 [/TD][/TR] [TR] [TH=bgcolor: #E6EBFF, align: left] Direct D/L link: [/TH][TD=colspan: 2] Locally archived copy[/TD][/TR][/TABLE]Sometimes we ran into hashes and other codes and can't figure out where did they came from and how they were built. If you work on pen-testing that might easily happen when you are testing systems from a black box perspective and you are able to grab a password file with hashed contents maybe from an exposed backup file or by dumping memory.. This may also be useful as a part of a fingerprinting process.You can either use a generic version or as a plugin for the Volatility framework. The usage is similar.Currently supports:shadow and SAM files, phpBB3, Wordpress, Joomla, CRC, LM, NTLM, MD4, MD5, Apr, SHA1, SHA256, base64, MySQL323, MYSQL4+, MSSQL2000, MSSQL2005, DES, RipeMD320, Whirlpool, SHA1, SHA224, SHA256, SHA384, SHA512, Blowfish, UUIDDownload:http://www.woodmann.com/collaborative/tools/images/Bin_Codetective_Analysis_Tool_2012-4-13_15.31_codetective.zipSursa: Category:Crypto Tools - Collaborative RCE Tool Library Quote