Date: Tue, 2 May 2006 10:32:20 -0400 (EDT) From: Bryan.Reymander@world.internetprotocol.be To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/96664: New Port: security/rainbowcrack Message-ID: <200605021432.k42EWK1n066662@world.internetprotocol.be> Resent-Message-ID: <200605021430.k42EUPP3061719@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 96664 >Category: ports >Synopsis: New Port: security/rainbowcrack >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Tue May 02 14:30:24 GMT 2006 >Closed-Date: >Last-Modified: >Originator: >Release: FreeBSD 5.4-RELEASE i386 >Organization: >Environment: System: FreeBSD world.internetprotocol.be 5.4-RELEASE FreeBSD 5.4-RELEASE #0: Sun May 8 10:21:06 UTC 2005 root@harlow.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386 >Description: Port of the Rainbow Crack utilities to FreeBSD. http://www.antsight.com/zsl/rainbowcrack/ >How-To-Repeat: >Fix: --- sharchive begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # /usr/ports/security/rainbowcrack/ # /usr/ports/security/rainbowcrack/pkg-descr # /usr/ports/security/rainbowcrack/pkg-plist # /usr/ports/security/rainbowcrack/Makefile # echo c - /usr/ports/security/rainbowcrack/ mkdir -p /usr/ports/security/rainbowcrack/ > /dev/null 2>&1 echo x - /usr/ports/security/rainbowcrack/pkg-descr sed 's/^X//' >/usr/ports/security/rainbowcrack/pkg-descr << 'END-of-/usr/ports/security/rainbowcrack/pkg-descr' XRainbowCrack is a general propose implementation of Philippe Oechslin's Xfaster time-memory trade-off technique. X XIn short, the RainbowCrack tool is a hash cracker. A traditional brute force Xcracker try all possible plaintexts one by one in cracking time. It is time Xconsuming to break complex password in this way. The idea of time-memory Xtrade-off is to do all cracking time computation in advance and store the Xresult in files so called "rainbow table". It does take a long time to Xprecompute the tables. But once the one time precomputation is finished, a Xtime-memory trade-off cracker can be hundreds of times faster than a brute Xforce cracker, with the help of precomputed tables. X XWWW: http://www.antsight.com/zsl/rainbowcrack/ END-of-/usr/ports/security/rainbowcrack/pkg-descr echo x - /usr/ports/security/rainbowcrack/pkg-plist sed 's/^X//' >/usr/ports/security/rainbowcrack/pkg-plist << 'END-of-/usr/ports/security/rainbowcrack/pkg-plist' Xbin/rcrack Xbin/rtgen Xbin/rtdump Xbin/rtsort END-of-/usr/ports/security/rainbowcrack/pkg-plist echo x - /usr/ports/security/rainbowcrack/Makefile sed 's/^X//' >/usr/ports/security/rainbowcrack/Makefile << 'END-of-/usr/ports/security/rainbowcrack/Makefile' X# New ports collection makefile for: oneko X# Date created: 5 December 1994 X# Whom: asami X# X# $FreeBSD$ X# X XPORTNAME= rainbowcrack XPORTVERSION= 1.2 XCATEGORIES= security XMASTER_SITES= http://freshdns.net/rainbowcrack/ X XMAINTAINER= bryan@freshdns.net XCOMMENT= Rainbow Crack 1.2 X XMANCOMPRESSED= yes X XUSE_GMAKE= yes X X.include <bsd.port.mk> END-of-/usr/ports/security/rainbowcrack/Makefile exit --- sharchive ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200605021432.k42EWK1n066662>