Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: bkhive | Distribution: Mageia |
Version: 1.1.1 | Vendor: Mageia.Org |
Release: 7.mga8 | Build date: Wed Feb 12 20:01:23 2020 |
Group: Security | Build host: localhost |
Size: 40057 | Source RPM: bkhive-1.1.1-7.mga8.src.rpm |
Packager: umeabot <umeabot> | |
Url: http://ophcrack.sourceforge.net/ | |
Summary: Dump the syskey bootkey from a Windows system hive |
This tool is designed to recover the syskey bootkey from a Windows NT/2K/XP system hive. Then we can decrypt the SAM file with the syskey and dump password hashes. Syskey is a Windows feature that adds an additional encryption layer to the password hashes stored in the SAM database.
GPLv2+
* Wed Feb 12 2020 umeabot <umeabot> 1.1.1-7.mga8 + Revision: 1510734 - Mageia 8 Mass Rebuild + wally <wally> - replace deprecated %makeinstall_std * Fri Sep 21 2018 umeabot <umeabot> 1.1.1-6.mga7 + Revision: 1295503 - Mageia 7 Mass Rebuild
/usr/bin/bkhive /usr/lib/.build-id /usr/lib/.build-id/ee /usr/lib/.build-id/ee/4af5b2f834bd853403bbc6ea30e0d83e090f99 /usr/share/doc/bkhive /usr/share/doc/bkhive/AUTHORS /usr/share/doc/bkhive/COPYING /usr/share/doc/bkhive/README /usr/share/man/man1/bkhive.1.xz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sun Mar 9 11:24:54 2025