From owner-freebsd-ports@FreeBSD.ORG Tue Feb 17 12:36:33 2004 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id E3D7D16A4CE for ; Tue, 17 Feb 2004 12:36:33 -0800 (PST) Received: from mail.komquats.com (h24-108-145-252.gv.shawcable.net [24.108.145.252]) by mx1.FreeBSD.org (Postfix) with ESMTP id AC5BA43D1D for ; Tue, 17 Feb 2004 12:36:33 -0800 (PST) (envelope-from Cy.Schubert@komquats.com) Received: from cwsys.cwsent.com (cwsys [10.1.1.1]) by mail.komquats.com (Postfix) with ESMTP id DB9B35A82F; Tue, 17 Feb 2004 12:36:31 -0800 (PST) Received: from cwsys (localhost [127.0.0.1]) by cwsys.cwsent.com (8.12.10/8.12.8) with ESMTP id i1HKaVEd022915; Tue, 17 Feb 2004 12:36:31 -0800 (PST) (envelope-from Cy.Schubert@uumail.gov.bc.ca) Message-Id: <200402172036.i1HKaVEd022915@cwsys.cwsent.com> X-Mailer: exmh version 2.6.3 04/04/2003 with nmh-1.0.4 From: Cy Schubert X-os: FreeBSD X-Sender: cy@cwsent.com X-URL: http://www.komquats.com/ To: Jens Schweikhardt In-Reply-To: Message from Jens Schweikhardt <20040217192648.GA2209@schweikhardt.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Tue, 17 Feb 2004 12:36:31 -0800 Sender: Cy.Schubert@komquats.com cc: ports@freebsd.org cc: Laurent LEVIER Subject: Re: Ports with duplicate LATEST_LINKS X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: Cy Schubert List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Feb 2004 20:36:34 -0000 In message <20040217192648.GA2209@schweikhardt.net>, Jens Schweikhardt writes: > On Tue, Feb 17, 2004 at 12:15:40PM -0800, Cy Schubert wrote: > # In message <6.0.1.1.2.20040217204419.01e2a170@213.30.158.180>, Laurent > # LEVIER w > # rites: > # > Hi Gentlemen, > # > > # > It is really a brute force attack tool to obtain passwords. > # > A password cracker (as Crack, John the Ripper, ...) but oriented to work > # > over the network. > # > > # > Hydra does password cracking against SMB (Windows), telnet, POP/IMAP, FTP > , .. > # > . > # > It does dictionnary attacks as simple password generation algorithms. > # > > # > I use that in my company to evaluate passwords quality when I am not > # > granted to crack the passwords directly from the box. > # > If I succeed, bad point for the box owner ;-) > # > # Should I commit the following patch to correct the wording? > > [s/Bruce/Brute] > > I'd say yes. While googling turns up some "bruce force" password > cracker tools, the unpacked hydra port turns up nothing when grepped with > > hydra/work/hydra-2.2 # find . -type f|xargs egrep -i bruce I will commit once I receive Laurent's (maintainer's) approval. Cheers, -- Cy Schubert http://www.komquats.com/ BC Government . FreeBSD UNIX Cy.Schubert@osg.gov.bc.ca . cy@FreeBSD.org http://www.gov.bc.ca/ . http://www.FreeBSD.org/