Distributed Network Attack (DNA)
Distributed Network Attack (DNA) is a new approach to recovering password protected files. In the past, recoveries have been limited to the processing power of one machine. Distributed Network Attack (DNA) uses the power of machines across the network or across the world to decrypt passwords. The DNA Server is installed in a central location where machines running the Distributed Network Attack (DNA) Client can access it over the network. DNA Manager coordinates the attack, assigning small portions of the key search to machines distributed throughout the network. The DNA Client will run in the background, only taking unused processor time. Distributed Network Attack (DNA) is used in many different environments to provide specific, password cracking related functions. For example, law enforcement and corporate security professionals can use PRTK and DNA in computer forensic investigations to access password-protected files. IT administrators can use DNA to recover system passwords, while individual users can use PRTK and DNA to recover lost passwords to personal files. These two products provide access to passwords for a large number of popular software applications. DNA uses multiple machines across the network or across the world to conduct key space and dictionary attacks. In many cases, this makes use of time those computers would normally be idle, saving the cost of additional hardware. Many organizations find that the cost of additional hardware is justified for a secure, dedicated password recovery lab.

Distributed Network Attack® (DNA®) Features ::
  • Leverage graphic processing units on Microsoft Windows machines with CUDA-enabled GPUs.
  • Easy to read Statistics and Graphs
  • Add user dictionaries
  • Optimization for password attacks for specific languages
  • Customize user dictionaries
  • Stealth client installation functionality
  • Automatic Client update when updating the DNA Server
  • Control which clients work on certain jobs
DNA® Worker Minimum Requirements ::
  • Operating System:
    • Windows® XP/2000
    • Macintosh OSX 10.3.9/10.4.x
    • Linux Red Hat/Fedora Core 4
    • Solaris
  • Processor:
    • Intel Pentium® III/P4/AMD Athlon™
    • Power PC G4/G5
    • Sparc
  • RAM: 1 Gb
  • Hard Disk Space: 40 Gb

Tutorials ::


Download ::

Official Website :: http://www.accessdata.com/

1 comments :

  1. Pleasant to be going to your online journal yet again, it has been months for me. Well this article ive been sat tight for thusly long. i need this article to complete my task inside of the staff, and it has same subject together with your article. Much appreciated, pleasant offer.
    Registering Ideal Domain

    ReplyDelete

 
Top