L0phtCrack (v6) Rises Again 120
FyreWyr writes "L0phtCrack — now 12 years old — used to be a security 'tool of choice' for black hats, pen-testers, and security auditors alike — that is, until it was sold by L0pht to @stake, then Symantec, to be released and subsequently dropped as LC 5. As an IT security consultant, I used this tool to regularly expose vulnerabilities or recover data when there were few other options available. Eventually, I let it go as tech evolved away. Now, after being returned to its original developers, version 6 was released this week with fresh features: support for 64-bit multiprocessors, (current) Unix and Windows operating systems, and a number of other features, including enhanced handling of NTLM password hashes and support for rainbow tables. Interested parties, especially consultants, will find this shiny new version sports a hefty price tag. It raises doubts in my mind whether it can effectively compete with open source alternatives that go by similar names, but as I found earlier versions so useful, its re-emergence seems worth the mention."
Open Source Competitors (Score:5, Informative)
When the submitter referenced "open source alternatives that go by similar names", he was referring to ophcrack [sourceforge.net]. Similar features are also available from Cain and Abel [www.oxid.it], and John the Ripper [openwall.com].
I maintain a list of top password crackers [sectools.org] and sniffers [sectools.org] as part of my SecTools.Org [sectools.org] site.
While the submitter is correct that they have much more competition now, I still wish to congratulate the former L0pht guys on the new release!
Re:Symantec has a knack of spoiling even the best (Score:3, Informative)
Re:Let me be the first to say: (Score:5, Informative)
Attention Overseas Customers
As required by law, L0phtcrack is subject to United States export controls. L0phtCrack may not be downloaded or otherwise exported or re-exported outside the United States. By downloading or using L0phtCrack, you are agreeing to the foregoing and all applicable export control laws. See disclaimer for more details.
What kind of sorry-ass black-hat tool is this?
Re:Am I missing something?? (Score:3, Informative)
Precomputed hashes are useless unless they are *sorted* then they become useful. If you have a sorted precomputed hash table for, say, all 10 character passwords and you have a hash then you can *instantly* locate the matching hash from your table and retrieve the password provided it is 10 or fewer characters. Brute forcing would take *much* longer, even on modern CPUS. With hard drive space as cheap as it is these days, huge presorted precomputed hash tables are very feasible.. this is largely the reason why salts are used, as they effectively increase the password length to the point where using a table is infeasible.
Re:Am I missing something?? (Score:4, Informative)
these types are also generally very weak and a modern cpu may be able to compute them faster than it can spool from disk.
The way a rainbow table works is to generate a reverse mapping for your password, so if it's in the table, it's one index lookup away. Kind of hard to beat that, unless you're cracking WEP or something.
Re:Who remembers it? (Score:3, Informative)
You living on Earth, not in Nutziland.
Huh?
I thought the two terms were interchangeable....
Re:Let me be the first to say: (Score:5, Informative)
Re:Symantec has a knack of spoiling even the best (Score:3, Informative)
You might want to read TFA, so you have some idea what you are talking about. L0phtcrack is not owned by Symantec, and has been re-acquired by the original developers. It is in the article. Really. Don't let the clueless mods fool you. Your post was not only completely lacking in insight, it is just plain and flat wrong.
Re:Am I missing something?? (Score:3, Informative)
No, and the first Google result [wikipedia.org] would have worked.
Not sure how you ended up at some random wordpress blog. Learn to search properly.
Re:still? (Score:3, Informative)
Ignore the idiot AC who responded to you. Password storage has nothing to do with Kerberos. The two things are related, but orthogonal.
Windows still uses NTLM without a salt in the current versions.
There is a way to encrypt the SAM with a symmetric cipher, which requires that a floppy or USB key must be physically present for the SAM to be accessed. It's not widely used.
Re:Open Source Competitors (Score:2, Informative)
Praise the almighty creator of nmap [insecure.org] !!!