diff options
author | Trevor Johnson <trevor@FreeBSD.org> | 2000-11-05 01:38:51 +0000 |
---|---|---|
committer | Trevor Johnson <trevor@FreeBSD.org> | 2000-11-05 01:38:51 +0000 |
commit | f7d6b8ff3e3697d06faeb48b9d74b6d7e1c4a025 (patch) | |
tree | 83947430f095af2d927df08aa978b5cdbde122b1 | |
parent | 25c732ec08e1efa7046ef9b03b340a74252a544b (diff) | |
download | ports-f7d6b8ff3e3697d06faeb48b9d74b6d7e1c4a025.tar.gz ports-f7d6b8ff3e3697d06faeb48b9d74b6d7e1c4a025.zip |
Notes
-rw-r--r-- | security/Makefile | 1 | ||||
-rw-r--r-- | security/l0phtcrack/Makefile | 47 | ||||
-rw-r--r-- | security/l0phtcrack/distinfo | 1 | ||||
-rw-r--r-- | security/l0phtcrack/files/patch-ztest_c | 11 | ||||
-rw-r--r-- | security/l0phtcrack/pkg-comment | 1 | ||||
-rw-r--r-- | security/l0phtcrack/pkg-descr | 21 |
6 files changed, 82 insertions, 0 deletions
diff --git a/security/Makefile b/security/Makefile index 6cf45c2551c5..6f11eb1e11ce 100644 --- a/security/Makefile +++ b/security/Makefile @@ -44,6 +44,7 @@ SUBDIR += krb5 SUBDIR += kssh SUBDIR += l0pht-watch + SUBDIR += l0phtcrack SUBDIR += libident SUBDIR += libmcrypt SUBDIR += libmcrypt-nm diff --git a/security/l0phtcrack/Makefile b/security/l0phtcrack/Makefile new file mode 100644 index 000000000000..9853f2abfe3f --- /dev/null +++ b/security/l0phtcrack/Makefile @@ -0,0 +1,47 @@ +# New ports collection makefile for: l0phtcrack +# Date created: 2000-10-31 +# Whom: Trevor Johnson +# +# $FreeBSD$ +# + +PORTNAME= l0phtcrack +PORTVERSION= 1.5 +CATEGORIES= security +MASTER_SITES= http://www.l0pht.com/l0phtcrack/dist/ +DISTNAME= lcsrc +DIST_SUBDIR= ${PORTNAME} + +MAINTAINER= trevor@FreeBSD.org + +DOCDIR= share/doc/${PORTNAME} +NO_PACKAGE= "uses GNU getopt with BSDish-licensed code from OpenSSL" +NO_WRKSUBDIR= yes +PLIST= ${WRKDIR}/pkg-plist +USE_ZIP= yes + +post-extract: + ${RM} ${WRKDIR}/*exe + ${PERL} -pi -e "s:\r::g" ${WRKDIR}/* + ${PERL} -pi -e "s:ommited:omitted:g" ${WRKDIR}/util.c + +do-build: + cd ${WRKDIR} && ${CC} ${CFLAGS} -DMPU8086 *.c -o lc_CLI + +pre-install: + ${ECHO} bin/lc_CLI > ${PLIST} +.if !defined(NOPORTDOCS) + for i in `find ${WRKDIR} -name '*txt'`; \ + do ${ECHO} ${DOCDIR}/`${BASENAME} $${i}` >> ${PLIST}; \ + done + ${ECHO} @dirrm ${DOCDIR} >> ${PLIST} +.endif + +do-install: + ${INSTALL_PROGRAM} ${WRKSRC}/lc_CLI ${PREFIX}/bin +.if !defined(NOPORTDOCS) + ${MKDIR} ${PREFIX}/${DOCDIR} + cd ${WRKSRC} && pax -r -w *txt ${PREFIX}/${DOCDIR} +.endif + +.include <bsd.port.mk> diff --git a/security/l0phtcrack/distinfo b/security/l0phtcrack/distinfo new file mode 100644 index 000000000000..9084d2c16d12 --- /dev/null +++ b/security/l0phtcrack/distinfo @@ -0,0 +1 @@ +MD5 (l0phtcrack/lcsrc.zip) = 4012199e6d522b47c35be4b12c505dd3 diff --git a/security/l0phtcrack/files/patch-ztest_c b/security/l0phtcrack/files/patch-ztest_c new file mode 100644 index 000000000000..096892389ebe --- /dev/null +++ b/security/l0phtcrack/files/patch-ztest_c @@ -0,0 +1,11 @@ +--- ztest.c.orig Sat Nov 4 15:24:32 2000 ++++ ztest.c Sat Nov 4 15:25:05 2000 +@@ -144,7 +144,7 @@ + + char str_to_crypt[] = "\x4b\x47\x53\x21\x40\x23\x24\x25"; + +-void main(int argc, char **argv) { ++int main(int argc, char **argv) { + FILE *pwlist, *wordlist, *outlist; + char dict_word[MAX_WORD]; + char *pwfile, *wordfile, *outfile; diff --git a/security/l0phtcrack/pkg-comment b/security/l0phtcrack/pkg-comment new file mode 100644 index 000000000000..fcb50223d49a --- /dev/null +++ b/security/l0phtcrack/pkg-comment @@ -0,0 +1 @@ +L0pht Heavy Industries' cracker for SAMBA or Windows NT passwords diff --git a/security/l0phtcrack/pkg-descr b/security/l0phtcrack/pkg-descr new file mode 100644 index 000000000000..2e2ca8fe45c1 --- /dev/null +++ b/security/l0phtcrack/pkg-descr @@ -0,0 +1,21 @@ +from the readme.txt: + + L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and + NT password hashes back into the original clear text + passwords. The program does this using dictionary cracking + and also brute force. L0phtCrack 1.5 returns not just the + LANMAN password but the NT password up to 14 characters in + length. + + L0phtCrack 1.5 includes the ability to dictionary attack + or brute force the network NT server challenge that is used + to prevent the OWF from going across the wire in its + plain-text format. Sample network sniffed challenges are + in files sniff.txt and sniff2.txt. This means you can get + NT passwords without administrator privileges if you have + network access between the client and the server. + +WWW: http://www.l0pht.com/l0phtcrack/ + +Trevor Johnson +trevor@FreeBSD.org |