aboutsummaryrefslogtreecommitdiffstats
path: root/security/l0phtcrack
diff options
context:
space:
mode:
authordanfe <danfe@FreeBSD.org>2011-08-10 00:36:46 +0800
committerdanfe <danfe@FreeBSD.org>2011-08-10 00:36:46 +0800
commite364c58d7ff0982c85e193efcbf4aad3f66263f5 (patch)
treeac8732252aba2f53b35129b77ffc353c4a1134bf /security/l0phtcrack
parentc206d9b7c7cbac6724d67070c10efacbd2d87e8e (diff)
downloadfreebsd-ports-gnome-e364c58d7ff0982c85e193efcbf4aad3f66263f5.tar.gz
freebsd-ports-gnome-e364c58d7ff0982c85e193efcbf4aad3f66263f5.tar.zst
freebsd-ports-gnome-e364c58d7ff0982c85e193efcbf4aad3f66263f5.zip
- Sanitize port description and remove old-school attribution
- Remove defunct WWW address (redirects to www.symantec.com now; official L0phtCrack site no longer distributes open source version)
Diffstat (limited to 'security/l0phtcrack')
-rw-r--r--security/l0phtcrack/pkg-descr31
1 files changed, 11 insertions, 20 deletions
diff --git a/security/l0phtcrack/pkg-descr b/security/l0phtcrack/pkg-descr
index 269d5e159ec2..144b138b1e77 100644
--- a/security/l0phtcrack/pkg-descr
+++ b/security/l0phtcrack/pkg-descr
@@ -1,20 +1,11 @@
-from the readme.txt:
-
- L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and
- NT password hashes back into the original clear text
- passwords. The program does this using dictionary cracking
- and also brute force. L0phtCrack 1.5 returns not just the
- LANMAN password but the NT password up to 14 characters in
- length.
-
- L0phtCrack 1.5 includes the ability to dictionary attack
- or brute force the network NT server challenge that is used
- to prevent the OWF from going across the wire in its
- plain-text format. Sample network sniffed challenges are
- in files sniff.txt and sniff2.txt. This means you can get
- NT passwords without administrator privileges if you have
- network access between the client and the server.
-
-WWW: http://www.atstake.com/products/lc/
-
-Trevor Johnson
+L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password hashes
+back into the original clear text passwords. The program does this using
+dictionary cracking and also brute force. L0phtCrack returns not just the
+LANMAN password but the NT password up to 14 characters in length.
+
+L0phtCrack includes the ability to dictionary attack or brute force the
+network NT server challenge that is used to prevent the OWF (one-way format)
+from going across the wire in its plain-text format. Sample network sniffed
+challenges are in files sniff.txt and sniff2.txt. This means you can obtain
+NT passwords without administrator privileges when you have network access
+between the client and the server.