Ncrack – High Speed Network Authentication Cracking Tool

Don't let your data go over to the Dark Side!


Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients.

Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.

Ncrack’s features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap’s and many more.

Ncrack was started as a “Google Summer of Code” Project in 2009. While it is already useful for some purposes, it is still unfinished, alpha quality software. It is released as a standalone tool, be sure to read the Ncrack man page to fully understand Ncrack usage.

You can download Ncrack ALPHA here:

Tarball: ncrack-0.01ALPHA.tar.gz
Windows Binary: ncrack-0.01ALPHA-setup.exe

Or read more here.


Posted in: Hacking Tools, Network Hacking, Password Cracking

, , , , , , , , ,

Recent in Hacking Tools:
- SubBrute – Subdomain Brute-forcing Tool
- The Backdoor Factory (BDF) – Patch Binaries With Shellcode
- Gdog – Python Windows Backdoor With Gmail Command & Control

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,973,574 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,401,880 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 676,118 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


One Response to Ncrack – High Speed Network Authentication Cracking Tool

  1. Sniper March 3, 2010 at 12:14 pm #

    hmmm this may be useful after using the nasa.gov exploits posted at pinoysecurity… ;)