Daniel Weis posted a link in his blog which took my attention !!! Am sure you will be inversed as me if you are doing “Ethical Hacking” or “Penetration Testing”
Here is the info from the Web site:
A password cracking service for penetration testers and network auditors who need to check the security of WPA2-PSK protected wireless networks, crack password hashes, or break document encryption. they boast they can do 300,000,000 passwords in 20 minutes at a cost of $17 so not too bad
Save Money. Save Time.
Whether it’s a WPA2 network, NTLM hashes, or an encrypted PDF file, one thing’s for certain. By specializing in optimized cracking solutions and by fine-tuning dictionaries from iteration to iteration, we can provide a solution that’s more effective, faster, and cheaper than anything else.
We have a range of dictionaries, fine-tuned for the format at hand. By extrapolating from our successes and iterating over our failures, we’ve been able to converge on the most effective wordlists for the money, every time.
Feel Safe Knowing We Found It. Feel Secure If We Don’t.
Our jobs cost the same whether we find your password or not. You’re paying for either the recovery (which is most often the case), or the knowledge that if you were to build an exhaustively fine-tuned dictionary and run your data against it for several weeks, you’d find nothing.
Simple To Use.
Submit your job in three quick steps, and you’ll receive your results via email as soon as they are complete. We use Stripe to process payments, so we never receive or store your credit card information ourselves. 0
Dictionaries They are using
WPA / WPA2 Dictionaries
LM / NTLM Dictionaries
Information We Collect
When you submit a job, we collect and store:
- Your email address.
- Your job data (pcap file, pwdump, document, etc).
- Your IP address.
- Your job results.
How We Use Your Information
Our primary objective in collecting this information is to provide you with an improved experience when using the Service. We use this information to closely monitor which features of the Service are used most and to determine which features we need to focus on improving, including usage patterns and geographic locations to determine where we should offer or focus services, features and/or resources.
The Company uses your Internet Protocol (IP) address to help diagnose problems with our service, for fraud and abuse detection, and to administer the website.
Our Disclosure of Your Information
We do not share your personal information with any third party, except when absolutely required to by law.
The personally identifiable information we collect is securely stored within our database, and we use standard, industry-wide, commercially reasonable security practices such as encryption, firewalls and SSL (Secure Socket Layers) for protecting your information. However, as effective as encryption technology is, no security system is impenetrable. We cannot guarantee the security of our database, nor can we guarantee that information you supply won’t be intercepted while being transmitted to us over the Internet, and any information you transmit to the Company you do at your own risk
Worth to try for Auditing. The RISK! Its your own!
For more How To Articles