Rainbow Tables Attack (Cryptanalysis attack) and winrtgen

Hello friends welcome again !

You have read two articles on cracking passwords 1. Cain and Abel software for cracking hashes tutorial 2. Dictionary attack For Cracking passwords using Cain and Abel and 3. Brute Force Attack for Cracking Passwords using Cain and Abel In this article I am going to tell you about another attack for cracking passwords called Rainbow tables attack and some time Cryptanalysis attack.  before performing attack we need to create rainbow tables help of winrtgen.

Cryptanalysis attack (Using Rainbow Tables Attack) with cain and abel

From Wikipedia: “A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering the plain text password, up to a certain length consisting of a limited set of characters. It is a practical example of a space-time trade off, using more computer processing time at the cost of less storage when calculating a hash on every attempt, or less processing time and more storage when compared to a simple lookup table with one entry per hash. Use of a key derivation function that employ a salt makes this attack infeasible. Rainbow tables attacks are a refinement of an earlier, simpler algorithm by Martin Hellman.”

How To Make A Rainbow Table using winrtgen?

There are many tools that create a rainbow table and there are many rainbow tables already available on the internet.Fortunately, Cain comes with a tool called winrtgen, which is located in its own folder in the installation.

After run winrtgen follow the instruction to create a rainbow table

  1. Start winrtgen
    Run winrtgen to create rainbow tables
  2. Click on Add table at bottom –left corner
  3. Select hashes type minimum and maximum length of password
  4. Select charset option
    winrtgen available option
  5. Click on OK
  6. Again OK

Rainbow table is started generate after some time you will find you rainbow table Use this and crack the password

Leave a Reply

Your email address will not be published. Required fields are marked *