The dictstat Python script is a great little tool for password cracking results analysis or for regular wordlist analysis. The dictstat application is located in the /pentest/passwords/pack directory on Backtrack 5 R3 and can be run using “python dictstat.py” from within that directory. Written by iphelix during the 2010 Crack Me If You Can password cracking competition and is part of a larger toolset called PACK or Password Analysis and Cracking Kit. Below we show some examples of dictstat in action along with some details of the available parsing mechanisms that are in place.
It appears that SQLLHF no longer works in Backtrack 5 release 3. When attempting to run this application it throws an error. I may update this article later with more information as I know the author of the software and once I can speak with him I will update accordingly. The good news is SQLLHF doesn’t accomplish any goals that other Microsoft SQL Server tools can accomplish so there is no loss in terms of functionality however at this point its just taking up real estate in the BT5 menu.
SQLDict servers one purpose which is to brute force Microsoft SQL Server passwords. The easiest way to launch SQLDict is using the Backtrack navigation menu which launches the SQLDict.exe application using wine. The interface is easy to use as shown in the below example images.