head	1.5;
access;
symbols
	RELEASE_8_3_0:1.5
	RELEASE_9_0_0:1.5
	RELEASE_7_4_0:1.4
	RELEASE_8_2_0:1.4
	RELEASE_6_EOL:1.4
	RELEASE_8_1_0:1.4
	RELEASE_7_3_0:1.4
	RELEASE_8_0_0:1.4
	RELEASE_7_2_0:1.4
	RELEASE_7_1_0:1.4
	RELEASE_6_4_0:1.4
	RELEASE_5_EOL:1.4
	RELEASE_7_0_0:1.4
	RELEASE_6_3_0:1.4
	PRE_XORG_7:1.4
	RELEASE_4_EOL:1.4
	RELEASE_6_2_0:1.4
	RELEASE_6_1_0:1.4
	RELEASE_5_5_0:1.4
	RELEASE_6_0_0:1.4
	RELEASE_5_4_0:1.4
	RELEASE_4_11_0:1.4
	RELEASE_5_3_0:1.4
	RELEASE_4_10_0:1.4
	RELEASE_5_2_1:1.4
	RELEASE_5_2_0:1.4
	RELEASE_4_9_0:1.2
	RELEASE_5_1_0:1.2
	RELEASE_4_8_0:1.2
	RELEASE_5_0_0:1.2
	RELEASE_4_7_0:1.2
	RELEASE_4_6_2:1.1
	RELEASE_4_6_1:1.1
	RELEASE_4_6_0:1.1
	RELEASE_5_0_DP1:1.1
	RELEASE_4_5_0:1.1
	RELEASE_4_4_0:1.1
	RELEASE_4_3_0:1.1
	RELEASE_4_2_0:1.1;
locks; strict;
comment	@# @;


1.5
date	2011.08.09.16.36.46;	author danfe;	state Exp;
branches;
next	1.4;

1.4
date	2003.11.20.16.21.48;	author trevor;	state Exp;
branches;
next	1.3;

1.3
date	2003.11.13.10.21.04;	author trevor;	state Exp;
branches;
next	1.2;

1.2
date	2002.09.21.07.21.05;	author trevor;	state Exp;
branches;
next	1.1;

1.1
date	2000.11.05.01.38.50;	author trevor;	state Exp;
branches;
next	;


desc
@@


1.5
log
@- Sanitize port description and remove old-school attribution
- Remove defunct WWW address (redirects to www.symantec.com now; official
  L0phtCrack site no longer distributes open source version)
@
text
@L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password hashes
back into the original clear text passwords.  The program does this using
dictionary cracking and also brute force.  L0phtCrack returns not just the
LANMAN password but the NT password up to 14 characters in length.

L0phtCrack includes the ability to dictionary attack or brute force the
network NT server challenge that is used to prevent the OWF (one-way format)
from going across the wire in its plain-text format.  Sample network sniffed
challenges are in files sniff.txt and sniff2.txt.  This means you can obtain
NT passwords without administrator privileges when you have network access
between the client and the server.
@


1.4
log
@Chase master site and home page.

detected by:	fenner's survey
@
text
@d1 4
a4 1
from the readme.txt:
d6 6
a11 18
	L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and
	NT password hashes back into the original clear text
	passwords.  The program does this using dictionary cracking
	and also brute force.  L0phtCrack 1.5 returns not just the
	LANMAN password but the NT password up to 14 characters in
	length.

	L0phtCrack 1.5 includes the ability to dictionary attack
	or brute force the network NT server challenge that is used
	to prevent the OWF from going across the wire in its
	plain-text format.  Sample network sniffed challenges are
	in files sniff.txt and sniff2.txt.  This means you can get
	NT passwords without administrator privileges if you have
	network access between the client and the server.

WWW:  http://www.atstake.com/products/lc/

Trevor Johnson
@


1.3
log
@Remove my e-mail address from DESCR files of ports
I have contributed, in order to attract less spam.
@
text
@d18 1
a18 1
WWW:  http://www.atstake.com/research/lc/
@


1.2
log
@Chase home page.
@
text
@a20 1
trevor@@FreeBSD.org
@


1.1
log
@Add new port of l0phtcrack 1.5, L0pht Heavy Industries' cracker
for SAMBA or Windows NT passwords.
@
text
@d18 1
a18 1
WWW:  http://www.l0pht.com/l0phtcrack/
@

