Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 23 Dec 2002 14:44:36 -0800
From:      paul beard <paulbeard@mac.com>
To:        FreeBSD Questions <freebsd-questions@FreeBSD.ORG>
Subject:   Re: L0phtcrack
Message-ID:  <3E0791D4.4090407@mac.com>
References:  <DAV68O0BnRKa8Th6kx800012e3d@hotmail.com> <1040682606.58381.96.camel@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
Stacey Roberts wrote:

> 
> Why would you want to do this? Personally, I figure its prudent to ask.
> 
It does have some legitimate uses, according to this page ( 
http://www.atstake.com/research/lc/ ):

> Consider that at one of the largest technology companies, where
> policy required that passwords exceed 8 characters, mix cases,
> and include numbers or symbols...
> 
> * L0phtCrack obtained 18% of the passwords in 10 minutes 
> * 90% of the passwords were recovered within 48 hours on a Pentium
> II/300 
> * The Administrator and most Domain Admin passwords were
> cracked
> 
> It doesn't have to be this way. Crack-resistant passwords are
> achievable and practical. But password auditing is the only
> sure way to identify user accounts with weak passwords. LC4
> offers an easy and adaptable way to address this threat and
> find vulnerable passwords.

> Take it from a 1998 Microsoft security bulletin:
> 
> "consider evaluating a tool such as L0phtcrack 2.0 for
> assisting in checking the quality of user passwords."



-- 
Paul Beard: seeking UNIX/internet engineering work
<http://paulbeard.no-ip.org/paulbeard.html>;
8040 27th Ave NE Seattle WA 98115 / 206 529 8400

"Laughter is the closest distance between two people."
		-- Victor Borge


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3E0791D4.4090407>