diff options
author | Alexey Dokuchaev <danfe@FreeBSD.org> | 2011-08-09 16:36:46 +0000 |
---|---|---|
committer | Alexey Dokuchaev <danfe@FreeBSD.org> | 2011-08-09 16:36:46 +0000 |
commit | bf974945efd42e17ccd482795013a4a1a577b457 (patch) | |
tree | a319e33bac1c195f99ec8e849f3c5755ddcba1e0 /security/l0phtcrack | |
parent | 31b0b32e25dbc86c8b5b4a7c8957e11fe00602e5 (diff) | |
download | ports-bf974945efd42e17ccd482795013a4a1a577b457.tar.gz ports-bf974945efd42e17ccd482795013a4a1a577b457.zip |
Notes
Diffstat (limited to 'security/l0phtcrack')
-rw-r--r-- | security/l0phtcrack/pkg-descr | 31 |
1 files changed, 11 insertions, 20 deletions
diff --git a/security/l0phtcrack/pkg-descr b/security/l0phtcrack/pkg-descr index 269d5e159ec2..144b138b1e77 100644 --- a/security/l0phtcrack/pkg-descr +++ b/security/l0phtcrack/pkg-descr @@ -1,20 +1,11 @@ -from the readme.txt: - - L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and - NT password hashes back into the original clear text - passwords. The program does this using dictionary cracking - and also brute force. L0phtCrack 1.5 returns not just the - LANMAN password but the NT password up to 14 characters in - length. - - L0phtCrack 1.5 includes the ability to dictionary attack - or brute force the network NT server challenge that is used - to prevent the OWF from going across the wire in its - plain-text format. Sample network sniffed challenges are - in files sniff.txt and sniff2.txt. This means you can get - NT passwords without administrator privileges if you have - network access between the client and the server. - -WWW: http://www.atstake.com/products/lc/ - -Trevor Johnson +L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password hashes +back into the original clear text passwords. The program does this using +dictionary cracking and also brute force. L0phtCrack returns not just the +LANMAN password but the NT password up to 14 characters in length. + +L0phtCrack includes the ability to dictionary attack or brute force the +network NT server challenge that is used to prevent the OWF (one-way format) +from going across the wire in its plain-text format. Sample network sniffed +challenges are in files sniff.txt and sniff2.txt. This means you can obtain +NT passwords without administrator privileges when you have network access +between the client and the server. |