Overclock.net banner

[ZD] The return of L0phtCrack

811 Views 8 Replies 8 Participants Last post by  crashnburn_819
http://blogs.zdnet.com/security/?p=2737

Quote:


More than two years after Symantec pulled the plug on L0phtCrack, the venerable password cracking tool is being prepped for a return to the spotlight.

The original creators of L0phtCrack has reacquired the tool with plans to release a new version at next week's SOURCE Boston conference.

A teaser post on the l0phtcrack.com Web site mentions "new features and platform support," which, according to Space Rogue, includes 64-bit Windows support and upgraded rainbow tables.
Details on potential additional new features, and pricing have not yet been released but you can bet that it will be better than Symantec's.

There's a special session on the return of L0phtCrack scheduled for Thursday March 12 at SOURCE Boston.

Symantec quietly discontinued sales and support for L0phtCrack in 2006 out of concerns that it violated cryptography export controls.

L0phtCrack was a popular tool used to identify and remediate security vulnerabilities that result from the use of weak or easily guessed passwords. It was also used to recover Windows and Unix account passwords to access user and administrator accounts whose passwords are lost or to streamline migration of users to newer authentication systems.

It was originally produced by the L0pht, the Boston-based security research group founded by Peiter "Mudge" Zatko and Chris "Weld Pond" Wysopal.

1 - 9 of 9 Posts
I love this tool, I haven't used it in years but it would work great. I hope there is cuda/stream support
I think he is reffering to the ATI version of CUDA.
I havent used this tool in a long time, but its good to hear that theyre bringing it back...
3
Quote:


Originally Posted by DJZeratul
View Post

wow, i used this tool to get my current job as sysadmin


Please explain.
See less See more
3
Quote:


Originally Posted by TheLegend
View Post

Please explain.


or not if you will get fired
See less See more
3
Quote:


Originally Posted by TheLegend
View Post

Please explain.


Well, I was at the university when I overheard the IT techs having a ton of issues with a previous sysadmin who flaked, left, and took all the password with him, even to the windows 2000 datacenter servers. I was already really tight with all the IT guys because I did a lot of work in the computer labs during my CS classes, helping people with random problems, so much so that the IT guys knew me and appreciated the help. I came to them and said "If you want, i can probably get into that datacenter server"...

I used L0pht to brute force the password (which was stupid... it turned out to be a really easy password, one which i probably could have guessed using a dictionary attack or something) and it took about overnight to get it. Back then, on a dual P3 733 server, this was an amazing feat. It got me a job as an IT, and I have made my way up to sysadmin in the past 8 years.
See less See more
2
... DJZeratul, you are my new hero

I want to grow up to be just like you so I can get a system admin position by breaking into their servers
See less See more
1 - 9 of 9 Posts
This is an older thread, you may not receive a response, and could be reviving an old thread. Please consider creating a new thread.
Top