aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTrevor Johnson <trevor@FreeBSD.org>2000-11-05 01:38:51 +0000
committerTrevor Johnson <trevor@FreeBSD.org>2000-11-05 01:38:51 +0000
commitf7d6b8ff3e3697d06faeb48b9d74b6d7e1c4a025 (patch)
tree83947430f095af2d927df08aa978b5cdbde122b1
parent25c732ec08e1efa7046ef9b03b340a74252a544b (diff)
downloadports-f7d6b8ff3e3697d06faeb48b9d74b6d7e1c4a025.tar.gz
ports-f7d6b8ff3e3697d06faeb48b9d74b6d7e1c4a025.zip
Notes
-rw-r--r--security/Makefile1
-rw-r--r--security/l0phtcrack/Makefile47
-rw-r--r--security/l0phtcrack/distinfo1
-rw-r--r--security/l0phtcrack/files/patch-ztest_c11
-rw-r--r--security/l0phtcrack/pkg-comment1
-rw-r--r--security/l0phtcrack/pkg-descr21
6 files changed, 82 insertions, 0 deletions
diff --git a/security/Makefile b/security/Makefile
index 6cf45c2551c5..6f11eb1e11ce 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -44,6 +44,7 @@
SUBDIR += krb5
SUBDIR += kssh
SUBDIR += l0pht-watch
+ SUBDIR += l0phtcrack
SUBDIR += libident
SUBDIR += libmcrypt
SUBDIR += libmcrypt-nm
diff --git a/security/l0phtcrack/Makefile b/security/l0phtcrack/Makefile
new file mode 100644
index 000000000000..9853f2abfe3f
--- /dev/null
+++ b/security/l0phtcrack/Makefile
@@ -0,0 +1,47 @@
+# New ports collection makefile for: l0phtcrack
+# Date created: 2000-10-31
+# Whom: Trevor Johnson
+#
+# $FreeBSD$
+#
+
+PORTNAME= l0phtcrack
+PORTVERSION= 1.5
+CATEGORIES= security
+MASTER_SITES= http://www.l0pht.com/l0phtcrack/dist/
+DISTNAME= lcsrc
+DIST_SUBDIR= ${PORTNAME}
+
+MAINTAINER= trevor@FreeBSD.org
+
+DOCDIR= share/doc/${PORTNAME}
+NO_PACKAGE= "uses GNU getopt with BSDish-licensed code from OpenSSL"
+NO_WRKSUBDIR= yes
+PLIST= ${WRKDIR}/pkg-plist
+USE_ZIP= yes
+
+post-extract:
+ ${RM} ${WRKDIR}/*exe
+ ${PERL} -pi -e "s:\r::g" ${WRKDIR}/*
+ ${PERL} -pi -e "s:ommited:omitted:g" ${WRKDIR}/util.c
+
+do-build:
+ cd ${WRKDIR} && ${CC} ${CFLAGS} -DMPU8086 *.c -o lc_CLI
+
+pre-install:
+ ${ECHO} bin/lc_CLI > ${PLIST}
+.if !defined(NOPORTDOCS)
+ for i in `find ${WRKDIR} -name '*txt'`; \
+ do ${ECHO} ${DOCDIR}/`${BASENAME} $${i}` >> ${PLIST}; \
+ done
+ ${ECHO} @dirrm ${DOCDIR} >> ${PLIST}
+.endif
+
+do-install:
+ ${INSTALL_PROGRAM} ${WRKSRC}/lc_CLI ${PREFIX}/bin
+.if !defined(NOPORTDOCS)
+ ${MKDIR} ${PREFIX}/${DOCDIR}
+ cd ${WRKSRC} && pax -r -w *txt ${PREFIX}/${DOCDIR}
+.endif
+
+.include <bsd.port.mk>
diff --git a/security/l0phtcrack/distinfo b/security/l0phtcrack/distinfo
new file mode 100644
index 000000000000..9084d2c16d12
--- /dev/null
+++ b/security/l0phtcrack/distinfo
@@ -0,0 +1 @@
+MD5 (l0phtcrack/lcsrc.zip) = 4012199e6d522b47c35be4b12c505dd3
diff --git a/security/l0phtcrack/files/patch-ztest_c b/security/l0phtcrack/files/patch-ztest_c
new file mode 100644
index 000000000000..096892389ebe
--- /dev/null
+++ b/security/l0phtcrack/files/patch-ztest_c
@@ -0,0 +1,11 @@
+--- ztest.c.orig Sat Nov 4 15:24:32 2000
++++ ztest.c Sat Nov 4 15:25:05 2000
+@@ -144,7 +144,7 @@
+
+ char str_to_crypt[] = "\x4b\x47\x53\x21\x40\x23\x24\x25";
+
+-void main(int argc, char **argv) {
++int main(int argc, char **argv) {
+ FILE *pwlist, *wordlist, *outlist;
+ char dict_word[MAX_WORD];
+ char *pwfile, *wordfile, *outfile;
diff --git a/security/l0phtcrack/pkg-comment b/security/l0phtcrack/pkg-comment
new file mode 100644
index 000000000000..fcb50223d49a
--- /dev/null
+++ b/security/l0phtcrack/pkg-comment
@@ -0,0 +1 @@
+L0pht Heavy Industries' cracker for SAMBA or Windows NT passwords
diff --git a/security/l0phtcrack/pkg-descr b/security/l0phtcrack/pkg-descr
new file mode 100644
index 000000000000..2e2ca8fe45c1
--- /dev/null
+++ b/security/l0phtcrack/pkg-descr
@@ -0,0 +1,21 @@
+from the readme.txt:
+
+ L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and
+ NT password hashes back into the original clear text
+ passwords. The program does this using dictionary cracking
+ and also brute force. L0phtCrack 1.5 returns not just the
+ LANMAN password but the NT password up to 14 characters in
+ length.
+
+ L0phtCrack 1.5 includes the ability to dictionary attack
+ or brute force the network NT server challenge that is used
+ to prevent the OWF from going across the wire in its
+ plain-text format. Sample network sniffed challenges are
+ in files sniff.txt and sniff2.txt. This means you can get
+ NT passwords without administrator privileges if you have
+ network access between the client and the server.
+
+WWW: http://www.l0pht.com/l0phtcrack/
+
+Trevor Johnson
+trevor@FreeBSD.org