Remote Password Recovery - Retrieves Passwords From Network Computers

Remote Password Recovery - Retrieves Passwords From Network Computers

Remote Password Recovery is a password auditing program and security test tool, it retrieves passwords for software products saved on local or remote network computers. The software recovers Internet Download Manager, FFFTP, FileZilla, WinProxy, FAR ftp, Easy Web Cam, Web Drive, Core FTP, Ipswitch IMail, Ipswitch Messenger, Ipswitch Messenger Server passwords. With this software you will be able to find and recover a lost or forgotten passwords, save and keep an up-to-date backup of all your software passwords in a central location.

Remote Password Recovery retrieves passwords from network computers and helps network administrators to examine the security of their networks by executing an audit of saved software passwords. By exposing insecure passwords, Remote Password Recovery demonstrates how secure a network is under remote password stealth attack.

Remote Password Recovery is a must have tool for network administrators and designed for corporate network password audit.

You can save retrieved passwords as Tab Delimited Txt File (.txt), Excel Workbook (.xls), CSV Comma Delimited (.csv), Access Database (.mdb), Web Page (.html) or XML Data (.xml) file, Print or Copy to Clipboard.

Download Buy Now

29.50 $

( Free 15-Days )
Remote Password Recovery
 

How to work with the Remote Password Recovery

 

The program provides two modes of authorization: Use My Login/Password and Use This Information. In the first case the already existed username and password are used for authorization. The fields Login and Password are disabled. In the second case the fields Login and Password are enabled and their values are used for authorization.

By default the local computer will be scanned. To scan remote computers press "Select Computers" button and in Host Range Selection Dialog specify the range of IP addresses in the fields "Start IP Address" and "End IP Address" or select "IP Address List" field and provide the path to .txt file that contains the list of IP Addresses/Computer Names in every line. The software will resolve Remote IP address to Host name if field "Resolve Remote Host IP Address to Name" is checked.

You can run Remote Password Recovery from Command Line using following options:

/remote [Computer IP]

Retrieve passwords from the specified computer

/remote [From IP]-[To IP]

Retrieve passwords from computers in the specified IP addresses range

/iplist [Computer IP or Names File Path]

Retrieve passwords from all IP addresses specified in the file

/u [Admin User Name]

Administrator User Name

/p [Admin Password]

Administrator Password

/r

Covert IP addresses to Computer Names

/f [File Name To Save]

Save retrieved passwords to file .txt, .csv, .xls, .mdb, .html, .xml

/exit

Exit Remote Password Recovery after retrieving product keys

Examples:

 /remote 127.0.0.1 /f backup.xls /exit
 /remote 192.168.0.1-192.168.0.255 /u admin /p pwd /r /f out.html /exit
 /remote 192.168.0.24-192.168.0.26 /f "C:\Backup\backup.html" /exit
 /remote 192.168.0.26 /u admin /p pwd /f out.xml /exit
 /iplist "C:\Backup\iplist.txt" /r /f "C:\Backup\backup.mdb" /exit

 
 

Password Policy and Audit

  Strong passwords are the cornerstone of an organization’s information security. Comprehensive password policy understood and implemented by all employees within an organization, may significantly enhance the level of data protection. To make sure the password policy works well, password audits should be performed on a periodic basis.  
 

Information Security Audit

 

An organization’s IT security auditor should perform password and overall security audits on the corporate network. In fact, securing your passwords and applying all the current technical updates sometimes turns out to be insufficient, and to make sure everything is locked down you should perform a thorough security audit at least once a year. An organization’s security consultant would approach the corporate network using many of the “hacker” tools and techniques. A thorough security audit would penetrate your Internet firewall, test the strength of your passwords, verify the physical security of your data and backups, scan your whole network for security holes and vulnerabilities and provide a detailed report of the findings. The goal of a security audit is to give you recommendations and cost estimates on what it would take to fix security issues found during the audit and thus increase the corporate network’s security.

Security auditor should perform password cracking or guessing on a periodic or random basis. Password audits are an important component of the corporate security policy, as there is never a way to make any password uncrackable, no matter how strong the password restrictions are. A brute force attack will crack a password given enough time. Security policy must ensure the time and number of attempts is limited. Password audit performs a scan of access controls and user accounts within an organization’s network. If a password is guessed or cracked during this scan, the user must be required to change it.

 
 

Corporate Data Protection

  Password policy and audits are a necessary component of an organization’s overall information security strategy. If implemented correctly, password policy helps protect sensitive information from virtually any type of attack.