aboutsummaryrefslogtreecommitdiff
path: root/security/l0phtcrack
diff options
context:
space:
mode:
authorAlexey Dokuchaev <danfe@FreeBSD.org>2011-08-09 16:36:46 +0000
committerAlexey Dokuchaev <danfe@FreeBSD.org>2011-08-09 16:36:46 +0000
commitbf974945efd42e17ccd482795013a4a1a577b457 (patch)
treea319e33bac1c195f99ec8e849f3c5755ddcba1e0 /security/l0phtcrack
parent31b0b32e25dbc86c8b5b4a7c8957e11fe00602e5 (diff)
downloadports-bf974945efd42e17ccd482795013a4a1a577b457.tar.gz
ports-bf974945efd42e17ccd482795013a4a1a577b457.zip
Notes
Diffstat (limited to 'security/l0phtcrack')
-rw-r--r--security/l0phtcrack/pkg-descr31
1 files changed, 11 insertions, 20 deletions
diff --git a/security/l0phtcrack/pkg-descr b/security/l0phtcrack/pkg-descr
index 269d5e159ec2..144b138b1e77 100644
--- a/security/l0phtcrack/pkg-descr
+++ b/security/l0phtcrack/pkg-descr
@@ -1,20 +1,11 @@
-from the readme.txt:
-
- L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and
- NT password hashes back into the original clear text
- passwords. The program does this using dictionary cracking
- and also brute force. L0phtCrack 1.5 returns not just the
- LANMAN password but the NT password up to 14 characters in
- length.
-
- L0phtCrack 1.5 includes the ability to dictionary attack
- or brute force the network NT server challenge that is used
- to prevent the OWF from going across the wire in its
- plain-text format. Sample network sniffed challenges are
- in files sniff.txt and sniff2.txt. This means you can get
- NT passwords without administrator privileges if you have
- network access between the client and the server.
-
-WWW: http://www.atstake.com/products/lc/
-
-Trevor Johnson
+L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password hashes
+back into the original clear text passwords. The program does this using
+dictionary cracking and also brute force. L0phtCrack returns not just the
+LANMAN password but the NT password up to 14 characters in length.
+
+L0phtCrack includes the ability to dictionary attack or brute force the
+network NT server challenge that is used to prevent the OWF (one-way format)
+from going across the wire in its plain-text format. Sample network sniffed
+challenges are in files sniff.txt and sniff2.txt. This means you can obtain
+NT passwords without administrator privileges when you have network access
+between the client and the server.