Date: Sun, 30 May 1999 00:02:48 +0200 From: Ollivier Robert <roberto@keltia.freenix.fr> To: security@FreeBSD.ORG Subject: Re: System beeing cracked! Message-ID: <19990530000248.A6429@keltia.freenix.fr> In-Reply-To: <Pine.BSF.3.96.990529101506.23101A-100000@anchovy.orem.iserver.com>; from Paul Hart on Sat, May 29, 1999 at 10:19:38AM -0600 References: <xzpbtf32a5t.fsf@localhost.ping.uio.no> <Pine.BSF.3.96.990529101506.23101A-100000@anchovy.orem.iserver.com>
next in thread | previous in thread | raw e-mail | index | archive | help
According to Paul Hart: > non-DES crypt replacements used in various UNIX versions, such as > FreeBSD's MD5 and OpenBSD's Blowfish, and uses hand-optimized assembly So does Crack 5.0a, I know, I gave Alec the pointers to it because he told me that he was a Linux guy but wanted to support our scheme :-) OpenBSD is not supported though because Crack was out before they implemented it. > It is probably the best overall password cracker available, in my opinion. I've not looked at JtR recently but I like the rule-based way of doing things used in Crack. -- Ollivier ROBERT -=- FreeBSD: The Power to Serve! -=- roberto@keltia.freenix.fr FreeBSD keltia.freenix.fr 4.0-CURRENT #71: Sun May 9 20:16:32 CEST 1999 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990530000248.A6429>