diff options
author | danfe <danfe@FreeBSD.org> | 2011-08-10 00:36:46 +0800 |
---|---|---|
committer | danfe <danfe@FreeBSD.org> | 2011-08-10 00:36:46 +0800 |
commit | e364c58d7ff0982c85e193efcbf4aad3f66263f5 (patch) | |
tree | ac8732252aba2f53b35129b77ffc353c4a1134bf /security/l0phtcrack | |
parent | c206d9b7c7cbac6724d67070c10efacbd2d87e8e (diff) | |
download | freebsd-ports-gnome-e364c58d7ff0982c85e193efcbf4aad3f66263f5.tar.gz freebsd-ports-gnome-e364c58d7ff0982c85e193efcbf4aad3f66263f5.tar.zst freebsd-ports-gnome-e364c58d7ff0982c85e193efcbf4aad3f66263f5.zip |
- Sanitize port description and remove old-school attribution
- Remove defunct WWW address (redirects to www.symantec.com now; official
L0phtCrack site no longer distributes open source version)
Diffstat (limited to 'security/l0phtcrack')
-rw-r--r-- | security/l0phtcrack/pkg-descr | 31 |
1 files changed, 11 insertions, 20 deletions
diff --git a/security/l0phtcrack/pkg-descr b/security/l0phtcrack/pkg-descr index 269d5e159ec2..144b138b1e77 100644 --- a/security/l0phtcrack/pkg-descr +++ b/security/l0phtcrack/pkg-descr @@ -1,20 +1,11 @@ -from the readme.txt: - - L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and - NT password hashes back into the original clear text - passwords. The program does this using dictionary cracking - and also brute force. L0phtCrack 1.5 returns not just the - LANMAN password but the NT password up to 14 characters in - length. - - L0phtCrack 1.5 includes the ability to dictionary attack - or brute force the network NT server challenge that is used - to prevent the OWF from going across the wire in its - plain-text format. Sample network sniffed challenges are - in files sniff.txt and sniff2.txt. This means you can get - NT passwords without administrator privileges if you have - network access between the client and the server. - -WWW: http://www.atstake.com/products/lc/ - -Trevor Johnson +L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password hashes +back into the original clear text passwords. The program does this using +dictionary cracking and also brute force. L0phtCrack returns not just the +LANMAN password but the NT password up to 14 characters in length. + +L0phtCrack includes the ability to dictionary attack or brute force the +network NT server challenge that is used to prevent the OWF (one-way format) +from going across the wire in its plain-text format. Sample network sniffed +challenges are in files sniff.txt and sniff2.txt. This means you can obtain +NT passwords without administrator privileges when you have network access +between the client and the server. |