EnglishSpanishGermanFrenchPortugueseItalianRussian

FAQ

1. What Linux distributions are supported by the program?
2. What are system requirements?
3. What access rights are required for importing data?
4. Can rainbow tables be used for password recovery?
5. What are the limitations of the evaluation version?

1.

What Linux distributions are supported by the program?

The program supports data import and password recovery for Linux distributions which use the following types of hashes:

  • DES (descrypt);
  • DES (bigcrypt);
  • MD5 ($1$);
  • MD5 ($apr1$);
  • Blowfish ($2a$);
  • Blowfish ($2y$);
  • SHA-256 ($5$);
  • SHA-512 ($6$).

Examples of supported Linux distributions: Arch Linux, CentOS, Debian, Fedora, Gentoo, Knoppix, Linux Mint, openSUSE, Oracle Linux, Red Hat Enterprise Linux, Slackware, SUSE Linux Enterprise Server, Ubuntu.

2.

What are system requirements?

System requirements:

  • any operating system with Oracle JRE 8 installed;
  • minimum of 1 Gb RAM;
  • free 18 Mb hard disk space (plus the space required for JRE installation);
  • minimum of 800x600 screen resolution.

3.

What access rights are required for importing data?

The source data for password recovery is stored in the shadow file. Only the user root has the required access by default.

To import over SSH, specify user with the following settings:

  • access over SSH protocol;
  • possibility of the sudo or su commands execution.

To copy the shadow file, specify either user root or one of the users with access to this file.

4.

Can rainbow tables be used for password recovery?

There are no rainbow tables files for Linux and applications for their creation. Precomputed hashes attack is not supported by the program.

The salt is used in the algorithms for calculating Linux passwords hashes. Thus, it is ineffective to create rainbow tables files.

5.

What are the limitations of the evaluation version?

The evaluation version has the following functional limitations:

  • only the first character of the recovered password is shown;
  • in hybrid attack, the quantity of added characters is limited;
  • the character set is limited to A-Z characters;
  • in brute force attack, the possible maximum password length is limited.