Security Basics mailing list archives

Re: Password Cracking


From: "Alan Worstell" <aw () sonic net>
Date: Wed, 8 Sep 2004 20:25:46 -0700

l0phtcrack and John the Ripper

-Alan
----- Original Message ----- 
From: "Prasanna M" <PrasannaM () catsglobal co in>
To: <security-basics () securityfocus com>
Cc: "'Simon Zuckerbraun '" <szucker () sst-pr-1 com>; <rtfm () o2 ie>
Sent: Wednesday, September 08, 2004 12:16 AM
Subject: RE: Password Cracking


just what are LC & John? (am new to security domain, sry) :-D
Prasanna

-----Original Message-----
From: Simon Zuckerbraun

Sent: 9/5/2004 8:34 AM
Subject: RE: Password Cracking

If I understand correctly, LC is capable of doing what you're asking.

Simon

-----Original Message-----
From: Eoin Fleming [mailto:rtfm () o2 ie]
Sent: Friday, August 27, 2004 4:44 PM

Subject: Password Cracking


Bit of an unusual one -

Lets imagine you are a security administrator at a company - strong
passwords are enforced but you suspect that there may be exceptions and
you want to raise management awareness of breaches of the password
policy BUT you can't run cracking software as then you will know
individuals passwords - which you don't want to know as this breaks
acountability rather nicely.

In short - is there software that can perform the function of LC and
John without giving the admin the password but rather rate the password
against against a set criteria?

--------------------------------------------------------------------------
-
Computer Forensics Training at the InfoSec Institute. All of our class
sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills
of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
--------------------------------------------------------------------------
--



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: