Date: Thu, 7 Mar 2019 08:45:12 +0000 (UTC) From: Alexey Dokuchaev <danfe@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r494918 - head/security/ophcrack Message-ID: <201903070845.x278jCoo069463@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: danfe Date: Thu Mar 7 08:45:11 2019 New Revision: 494918 URL: https://svnweb.freebsd.org/changeset/ports/494918 Log: Improve and actualize port description, spell "macOS" properly as Apple calls it this way now. Modified: head/security/ophcrack/pkg-descr Modified: head/security/ophcrack/pkg-descr ============================================================================== --- head/security/ophcrack/pkg-descr Thu Mar 7 07:47:52 2019 (r494917) +++ head/security/ophcrack/pkg-descr Thu Mar 7 08:45:11 2019 (r494918) @@ -1,17 +1,15 @@ Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in -seconds. Features: +seconds and offers the following features: - - Runs on Windows, GNU/Linux, FreeBSD, Mac OS X, etc. + - Runs on Windows, GNU/Linux, FreeBSD, macOS, etc. - Cracks LM and NTLM hashes - Free tables available for alphanumeric LM hashes - Brute-force module for simple passwords - Audit mode and CSV export - Real-time graphs to analyze passwords (optional) - - Loads hashes from local and remote SAM - - Loads hashes from encrypted SAM recovered from a Windows partition, - Vista included - - Supports soon to be released XP flash and Vista eight XL tables + - Loads hashes from local SAM, remote SAM, encrypted SAM + recovered from a Windows partition WWW: http://ophcrack.sourceforge.net/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201903070845.x278jCoo069463>