Skip to content

Commit 869896e

Browse files
authored
README.md
1 parent 55e0fcf commit 869896e

File tree

1 file changed

+147
-46
lines changed

1 file changed

+147
-46
lines changed

README.md

Lines changed: 147 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -1,64 +1,165 @@
1-
[![smilodon_banner](https://github.com/pxcs/smilodon/assets/151133481/d0c48a7f-02f5-4d61-9b0e-cb7d1b8d97c2)](https://github.com/pxcs/smilodon)
2-
<img src="https://www.animatedimages.org/data/media/562/animated-line-image-0378.gif" width="1000" height="2" />
1+
[![Circle CI](https://circleci.com/gh/openwall/john/tree/bleeding-jumbo.svg?style=shield)](https://circleci.com/gh/openwall/john/tree/bleeding-jumbo)
2+
[![Downloads](https://img.shields.io/badge/Download-Windows%20Build-blue.svg)](https://github.com/openwall/john-packages/releases)
3+
[![License](https://img.shields.io/badge/License-GPL%20%2B-blue.svg)](https://github.com/openwall/john/blob/bleeding-jumbo/doc/LICENSE)
4+
![GitHub commit activity](https://img.shields.io/github/commit-activity/m/openwall/john?color=yellow)
5+
![GitHub commits since tagged version](https://img.shields.io/github/commits-since/openwall/john/1.9.0-Jumbo-1?color=brown)
36

4-
## Smilodon cybertooth
5-
Smilodon, the world's premier password recovery utility, engineered for unparalleled speed and sophistication. Boasting support for five unique modes of attack and hashing ***algorithms***, Smilodon leverages the power of the core, and other hardware accelerators on every O.S in every computer. Its advanced capabilities also facilitate distributed password cracking, making it an indispensable tool for both online and offline scenarios. With Smilodon, recover passwords across diverse ```domains,``` including ```hash-based``` and other complex systems, with unprecedented efficiency and reliability.
7+
## Teeth ( Smilodon Cybertooth )
68

7-
In hashing, every piece of input ***data*** is used to produce a single output. Hash function. The central part of the hashing process is the hash function. This function takes the input data and applies a ```series of mathematical``` operations to it, resulting in a fixed-length string of characters.
9+
This is the community-enhanced, version of Teeth ( smilodon cybertooth ).
10+
It has a lot of code, documentation, and data contributed by jumbo
11+
developers and the user community. It is easy for new code to be added
12+
to jumbo, and the quality requirements are low, although lately we've
13+
started subjecting all contributions to quite some automated testing.
14+
This means that you get a lot of functionality that is not necessarily
15+
"mature", which in turn means that bugs in this code are to be expected.
816

9-
### Types of attacks
10-
- ***Brute-force*** attacks can be very time-consuming because they take a systematic approach to trying all possible permutations of characters in a sequence. The longer the password, the longer it takes. Brute-force attacks are most successful when users have common or weak passwords, which can be “guessed” by tools in a matter of seconds. Of course, Smilodon wouldn't just guess, but more specifically ```'calculate'``` the hash or the target domain.
17+
Teeth homepage is:
1118

12-
- ***Dictionary*** attack are similar to brute-force attacks, but they’re less about quantity and more about quality. In other words, instead of trying every possible combination, Smilodon start with the assumption that users are likely to follow certain patterns when they create a password. So they will home in on the most likely words rather than trying everything.
19+
https://www.openwall.com
1320

14-
### Surplus
15-
Supports ```distributed``` password cracking. It can handle various domains, including ***online***, ***offline***, and ***hash-based*** password recovery.
21+
If you have any comments on this release or on Teeth in general, please
22+
join the Teeth-users mailing list and post in there:
1623

17-
[![smilodon_banner_2](https://github.com/pxcs/smilodon/assets/151133481/f35820fd-18f4-4068-ac98-71c2c3021ec9)](https://github.com/pxcs/smilodon)
24+
https://www.openwall.com
1825

19-
```
20-
Protocol-attack/
21-
22-
├── Hash ----> Brute-> Dictionary-> Calculate-> Generate.
23-
24-
├── Active Domain ----> Brute-> Dictionary.
25-
26-
├── LDAP Space ----> Calculate-> Brute-> Dictionary.
27-
28-
├── More ----> [...]
29-
30-
├── run ----> bash scripts
31-
32-
├── README.md
33-
└── requirements.txt
34-
```
26+
For contributions to Teeth ( smilodon cybertooth ), please use pull requests on
27+
GitHub:
3528

36-
### Documentation and Credit
29+
https://github.com/pxcs/Teeth/CONTRIBUTING.md
3730

38-
The rest of documentation and Credit was on separate files.<br>
31+
Included below is basic Teeth core documentation.
3932

40-
- **Testing**<br>
41-
- **Rainbow in the table attack**<br>
42-
<hr>
33+
---
4334

44-
#### Smilodon | Passwords Descriptions Attack | Online and Offline
35+
## Teeth ( smilodon cybertooth ) password cracker.
4536

46-
<a href="https://github.com/pxcs/smilodon/"><img src="https://github.com/pxcs/smilodon/assets/151133481/4ba60929-bf7a-40be-8a8e-cc650a456cad" align="right" width="70" alt="smilodon-logo"></a>
37+
Teeth is a fast password cracker, currently available for
38+
many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS (the latter
39+
requires a contributed patch). Its primary purpose is to detect weak
40+
Unix passwords. Besides several crypt(3) password hash types most
41+
commonly found on various Unix flavors, supported out of the box are
42+
Kerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus
43+
hundreds of additional hashes and ciphers in "the next" versions.
4744

48-
> [<img src="https://github.com/pxcs/smilodon/assets/151133481/4ba60929-bf7a-40be-8a8e-cc650a456cad" width="20">]() smilodon, cyber-tooth | swiss army knife: <br>
49-
Hash values can be thought of as fingerprints for files. The contents of a file are processed through a cryptographic algorithm, and a unique numerical value, the hash value is produced that identifies the contents of the file. The way Hash identifier works was by checking the hash given against criteria for all the hash types it supports and will give a list of possible hash types.<br><br>
5045

51-
> [<img src="https://github.com/pxcs/smilodon/assets/151133481/4ba60929-bf7a-40be-8a8e-cc650a456cad" width="20">]() About online domain cracker<br>
52-
Currently this tool supports the following protocols: http-form-get, http-form-post, http-get, http-head, http-post, http-proxy, SSH (v1 and v2), SSHKEY.
53-
<hr>
46+
## How to install.
5447

55-
<!--lint enable double-link-->
48+
See [INSTALL](doc/INSTALL) for information on installing ( Teeth ) on your system.
5649

57-
> - [**JohnTheRipper**](https://github.com/openwall/john)
58-
> - [**Hydra**](https://github.com/vanhauser-thc/thc-hydra)
59-
> - [**HashCat**](https://github.com/hashcat/hashcat)
60-
> - [**FirmWare**](https://github.com/DarkFlippers/unleashed-firmware)
6150

62-
#### Note: Still in ***Beta*** version 🙏🏻, kindly need a contributions.<br><br><br>
51+
## How to use.
6352

64-
[![new](https://github.com/pxcs/smilodon/assets/151133481/9d76657a-9057-4b70-b0d8-f6e80c0c609e)](https://github.com/pxcs/)
53+
To run Teeth, you need to supply it with some password files and
54+
optionally specify a cracking mode, like this, using the default order
55+
of modes and assuming that "password" is a copy of your password file:
56+
57+
Teeth password.txt/domain
58+
59+
or, to restrict it to the wordlist mode only, but permitting the use
60+
of word mangling rules:
61+
62+
Teeth --wordlist=password.lst --rules passwd
63+
64+
Cracked passwords will be printed to the terminal and saved in the
65+
file called $TEETH/Teeth.pot (in the documentation and in the
66+
configuration file for John, "$Teeth" refers to Teeth's "home
67+
directory"; which directory it really is depends on how you installed
68+
Teeth). The $TEETH/Teeth.pot file is also used to not load password
69+
hashes that you already cracked when you run Teeth the next time.
70+
71+
To retrieve the cracked passwords, run:
72+
73+
Teeth --show passwd
74+
75+
While cracking, you can press any key for status, or 'q' or Ctrl-C to
76+
abort the session saving its state to a file ($TEETH/Teeth.rec by
77+
default). If you press Ctrl-C for a second time before Teeth had a
78+
chance to complete handling of your first Ctrl-C, Teeth will abort
79+
immediately without saving. By default, the state is also saved every
80+
10 minutes to permit for recovery in case of a crash.
81+
82+
To continue an interrupted session, run:
83+
84+
Teeth --restore
85+
86+
These are just the most essential things you can do with Teeth. For
87+
a complete list of command line options and for more complicated usage
88+
examples you should refer to OPTIONS and EXAMPLES, respectively.
89+
90+
Please note that "binary" (pre-compiled) distributions of Teeth may
91+
include alternate executables instead of just "Teeth". You may need to
92+
choose the executable that fits your system best, e.g. "Teeth-omp" to
93+
take advantage of multiple CPUs and/or CPU cores.
94+
95+
96+
## Features.
97+
98+
Teeth ( smilodon cybertooth ) is designed to be both feature-rich and fast. It
99+
combines several cracking modes in one program and is fully
100+
configurable for your particular needs (you can even define a custom
101+
cracking mode using the built-in compiler supporting a subset of C).
102+
Also, Teeth is available for several different platforms which enables
103+
you to use the same cracker everywhere (you can even continue a
104+
cracking session which you started on another platform).
105+
106+
Out of the box, Teeth supports (and autodetects) the following Unix
107+
crypt(3) hash types: traditional DES-based, "bigcrypt", BSDI extended
108+
DES-based, FreeBSD MD5-based (also used on Linux and in Cisco IOS), and
109+
OpenBSD Blowfish-based (now also used on some Linux distributions and
110+
supported by recent versions of Solaris). Also supported out of the box
111+
are Kerberos/AFS and Windows LM (DES-based) hashes, as well as DES-based
112+
tripcodes.
113+
114+
When running on Linux distributions with glibc, Teeth 1.7.6+
115+
additionally supports (and autodetects) SHA-crypt hashes (which are
116+
actually used by recent versions of Fedora and Ubuntu), with optional
117+
OpenMP parallelization (requires GCC 4.2+, needs to be explicitly
118+
enabled at compile-time by uncommenting the proper OMPFLAGS line near
119+
the beginning of the Makefile).
120+
121+
Similarly, when running on recent versions of Solaris, Teeth 1.7.6+
122+
supports and autodetects SHA-crypt and SunMD5 hashes, also with
123+
optional OpenMP parallelization (requires GCC 4.2+ or recent Sun Studio,
124+
needs to be explicitly enabled at compile-time by uncommenting the
125+
proper OMPFLAGS line near the beginning of the Makefile and at runtime
126+
by setting the OMP_NUM_THREADS environment variable to the desired
127+
number of threads).
128+
129+
"-jumbo" versions add support for hundreds of additional hash and cipher
130+
types, including fast built-in implementations of SHA-crypt and SunMD5,
131+
Windows NTLM (MD4-based) password hashes, various macOS and Mac OS X
132+
user password hashes, fast hashes such as raw MD5, SHA-1, SHA-256, and
133+
SHA-512 (which many "web applications" historically misuse for
134+
passwords), various other "web application" password hashes, various SQL
135+
and LDAP server password hashes, and lots of other hash types, as well
136+
as many non-hashes such as SSH private keys, S/Key skeykeys files,
137+
Kerberos TGTs, encrypted filesystems such as macOS .dmg files and
138+
"sparse bundles", encrypted archives such as ZIP (classic PKZIP and
139+
WinZip/AES), RAR, and 7z, encrypted document files such as PDF and
140+
Microsoft Office's - and these are just some examples. To load some of
141+
these larger files for cracking, a corresponding bundled *in zipTeeth program
142+
should be used first, and then its output fed into Teeth -jumbo.
143+
144+
## Documentation.
145+
146+
The rest of documentation is located in separate files, listed here in
147+
the recommended order of reading:
148+
149+
* [INSTALL](doc/INSTALL) - installation instructions
150+
* [OPTIONS](doc/OPTIONS) - command line options and additional utilities
151+
* [MODES](doc/MODES) - cracking modes: what they are
152+
* [CONFIG](doc/CONFIG) (*) - how to customize
153+
* [RULES](doc/RULES) (*) - wordlist rules syntax
154+
* [EXTERNAL](doc/EXTERNAL) (*) - defining an external mode
155+
* [EXAMPLES](doc/EXAMPLES) - usage examples - strongly recommended
156+
* [FAQ](doc/FAQ) - guess
157+
* [CHANGES](doc/CHANGES) (*) - history of changes
158+
* [CONTACT](doc/CONTACT) (*) - how to contact the author or otherwise obtain support
159+
* [CREDITS](doc/CREDITS) (*) - credits
160+
* [LICENSE](doc/LICENSE) - copyrights and licensing terms
161+
* [COPYING](doc/COPYING) - GNU GPL, as referenced by LICENSE above
162+
163+
(*) most users can safely skip these.
164+
165+
Thanks to all password recovery tool repo

0 commit comments

Comments
 (0)