Audit security policies, examine network security and recover account passwords with Proactive Password Auditor™ (PPA). Find out exactly how secure your network is by running a full-scale attack on account passwords. By recovering exposing insecure passwords, Proactive Password Auditor determines the security of your network.
Not all security policies are equally secure. A single password that is easy to break becomes the weak link in the chain that compromises security of the entire network. It is common for corporate users to use passwords too short or too simple. These passwords are easy to remember, but essentially insecure.
Proactive Password Auditor™ determines the security of your network by attempting to break into a network by recovering one of the passwords. If just one account is unlocked within certain time, this demonstrates vulnerability of the entire network. If the network withstands the attack for the period of time between password expirations, the password security policy is considered strong enough.
Recovering lost and forgotten passwords to user accounts is another purpose of Proactive Password Auditor™. By analyzing password hashes and recovering plain-text passwords, Proactive Password Auditor™ makes it possible to access and log in to user accounts, exposing the EFS-encrypted files and folders. A wide range of available attacks from dictionary to brute force makes it possible to recover passwords over the network, while the Rainbow attack recovers up to 95% of passwords in a matter of just minutes. Fortunately, the Rainbow attack cannot be executed from the outside!
Proactive Password Auditor™ can analyze Registry binaries and extracted dump files, allowing for off-line password recovery. Proactive Password Auditor™ runs on Windows 2000, XP, Vista, 7, 8, Windows Server 2003/2008/2012.
The program that is licensed to you is absolutely legal and you can use it provided that:
|1.||you are the legal owner of all files or data you are going to recover through the use of our software, or|
|2.||have permission from the legitimate owner to perform these acts.|
Any illegal use of our software will be solely your responsibility. Accordingly, you affirm that you have the legal right to access all data, information and files that have been hidden.
You further attest that the recovered data, passwords and/or files will not be used for any illegal purpose. Be aware that password recovery and any subsequent data decryption of unauthorized or otherwise illegally obtained files may constitute theft or another wrongful action and may result in your civil or criminal prosecution.
Get more information about Proactive Password Auditor
Get full version of Proactive Password Auditor
(c) 2009 ElcomSoft Co.Ltd.