Posts

Showing posts with the label RAVAN

How to Use Ravan for Password Cracking?

Image
By Parth Makadiya In My last pos t we have seen what is Ravan    Now let us see how to use the Ravan for cracking passwords. Requriments: Lot of Friends : Ravan is Distributed password cracking method. So you will need lot of friends who have Pc with Internet connection. The speed of cracking will increase based on the number of pc contribute in the cracking. How to use Ravan? Step1: Go to  http://www.andlabs.org/tools/ravan.html Enter the value of the hash that must be cracked Enter the value of the salt, if it is not a salted hash then leave it blank Enter the charset. Only these characters will be use in the brute force attack Select the hashing algorithm (MD5, SHA1, SHA256, SHA512) Select the position of the salt. (clear-text+salt or salt+clear-text) Hit ‘Submit Hash’ Step 2:  If hash is successfully submitted, it would return a URL.  Now you just need to send this URL to all your friends and ask them to click the  start...

Ravan , JavaScript based Distributed Password cracking

Image
By Parth Makadiya You want to crack a hash but your system speed is low?! No need to worry..! Here is solution for you , "Distributed Password Cracking". Let me introduce a new tool called "Ravan" developed by LavaKumar. About Ravan: Ravan is a JavaScript based Distributed Computing system that can perform brute force attacks on salted hashes by distributing the task across several browsers. It makes use of HTML5 WebWorkers to start background JavaScript threads in the browsers of the workers, each worker computes a part of the hash cracking activity. Ravan now supports MD5,SHA1,SHA256,SHA512 hashes. How it works? Ravan has three components: Master: The hash, salt, hashing algorithm, position of the salt (before or after salt) and the charset are submitted by the user. These are submitted to the web backend and it returns a ‘hash id’ which is unique to every submitted hash. It also supplies a ‘worker url’ specific to this hash that must be sent t...