Date: Tue, 17 Feb 2004 12:15:40 -0800 From: Cy Schubert <Cy.Schubert@komquats.com> To: Laurent LEVIER <llevier@argosnet.com> Cc: Jens Schweikhardt <schweikh@schweikhardt.net> Subject: Re: Ports with duplicate LATEST_LINKS Message-ID: <200402172015.i1HKFeEd022641@cwsys.cwsent.com> In-Reply-To: Message from Laurent LEVIER <llevier@argosnet.com> <6.0.1.1.2.20040217204419.01e2a170@213.30.158.180>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <6.0.1.1.2.20040217204419.01e2a170@213.30.158.180>, Laurent LEVIER w rites: > Hi Gentlemen, > > It is really a brute force attack tool to obtain passwords. > A password cracker (as Crack, John the Ripper, ...) but oriented to work > over the network. > > Hydra does password cracking against SMB (Windows), telnet, POP/IMAP, FTP, .. > . > It does dictionnary attacks as simple password generation algorithms. > > I use that in my company to evaluate passwords quality when I am not > granted to crack the passwords directly from the box. > If I succeed, bad point for the box owner ;-) Should I commit the following patch to correct the wording? Index: Makefile =================================================================== RCS file: /home/pcvs/ports/security/hydra/Makefile,v retrieving revision 1.6 diff -u -r1.6 Makefile --- Makefile 15 Feb 2004 00:26:41 -0000 1.6 +++ Makefile 17 Feb 2004 20:13:27 -0000 @@ -15,7 +15,7 @@ MASTER_SITE_SUBDIR= groups/thc MAINTAINER= llevier@argosnet.com -COMMENT= Bruce Force Attack Utility working on multiple network services +COMMENT= Brute force attack utility working on multiple network services NO_LATEST_LINK= yes PLIST_FILES= bin/hydra -- Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5231 Team Leader, Solaris Team Email: Cy.Schubert@osg.gov.bc.ca Open Systems Group, CITS Ministry of Management Services Province of BC FreeBSD UNIX: cy@FreeBSD.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200402172015.i1HKFeEd022641>