Share to: share facebook share twitter share wa share telegram print page

L0phtCrack

L0phtCrack
Developer(s)Peiter Zatko (Mudge), Chris Wysopal (Weld Pond), Christien Rioux (DilDog), Rob Cheyne, Ian Melven
Stable release
7.2.0[1]
Repository
Operating systemMicrosoft Windows
TypePassword Cracking, Operating System Audit
LicenseA combination of multiple open source licenses[2]
Websitel0phtcrack

L0phtCrack is a password auditing and recovery application originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, hybrid attacks, and rainbow tables.[3]

The initial version was released in the Spring of 1997.[4]

The application was produced by @stake after the L0pht merged with @stake in 2000. @stake was then acquired by Symantec in 2004.[5] Symantec later stopped selling this tool to new customers, citing US Government export regulations, and discontinued support in December 2006.[3][6]

In January 2009, L0phtCrack was acquired by the original authors Zatko, Wysopal, and Rioux from Symantec. L0phtCrack 6 was announced on 11 March 2009 at the SOURCE Boston Conference.[7] L0phtCrack 6 contains support for 64-bit Windows platforms as well as upgraded rainbow tables support.[8] L0phtCrack 7 was released on 30 August 2016, seven years after the previous release.[9] L0phtCrack 7 supports GPU cracking, increasing performance up to 500 times that of previous versions.[10]

On April 21, 2020, Terahash[11] announced it had acquired L0phtCrack. Details of the sale were not released.

On July 1, 2021 L0pht Holdings, LLC repossessed L0phtCrack after Terahash defaulted on its instalment sale loan. The current owners announced that they were exploring open source options for L0phtcrack. Due to commercial libraries existing within the software this may take some time.[12]

On October 17, 2021 L0phtCrack version 7.2.0 was released open-source, with different portions of the software being published under different licenses.[13][14]

References

  1. ^ . 17 October 2021 https://gitlab.com/l0phtcrack/l0phtcrack/-/releases/7.2.0. {{cite web}}: Missing or empty |title= (help)
  2. ^ "tools/releasetool/installer/license.txt". 2021-10-16. Archived from the original on 2023-06-13. Retrieved 2024-05-11.
  3. ^ a b "L0phtCrack". sectools.org. Archived from the original on 2024-05-11. Retrieved 2024-05-11.
  4. ^ Lange, Larry (1997-04-15). "Hackers keep the heat on Windows NT security". eeTimes. Archived from the original on 1998-12-05. Retrieved 2024-05-11.
  5. ^ Fisher, Dennis (2004-09-16). "Symantec Buys Security Consulting Pioneer @stake". eWeek. Archived from the original on 2024-05-24. Retrieved 2024-05-11.
  6. ^ Naraine, Ryan (2006-03-08). "Symantec Pulls Plug on L0phtCrack". eWeek. Archived from the original on 2024-05-24. Retrieved 2024-05-11.
  7. ^ "New version of L0phtcrack to be unveiled next week". Infosecurity Magazine. 2009-03-03. Archived from the original on 2024-05-11. Retrieved 2024-05-11.
  8. ^ Goodin, Dan (2009-05-27). "Seminal password tool rises from Symantec ashes". The Register. Archived from the original on 2019-12-10. Retrieved 2024-05-11.
  9. ^ Millman, Rene (2016-09-01). "New version of L0phtCrack makes cracking Windows passwords easier than ever". SC Magazine UK. Archived from the original on 2017-06-08.
  10. ^ Fisher, Dennis (2016-08-30). "L0phtCrack 7 Shows Windows Passwords Easier to Crack Now Than 20 Years Ago". onthewire. Archived from the original on 2017-08-10. Retrieved 2024-05-11.
  11. ^ "Terahash Acquires L0phtCrack". Archived from the original on 2020-04-21. Retrieved 2024-05-11.
  12. ^ "Changes for L0phtCrack". 2021-07-26. Archived from the original on 2021-09-23.
  13. ^ Rioux, Christien (2021-10-17). "update license and credits (25f681c0)". Archived from the original on 2023-02-20. Retrieved 2024-05-11.
  14. ^ Kovacs, Eduard (2021-10-18). "Password Auditing Tool L0phtCrack Released as Open Source". SecurityWeek.com. Archived from the original on 2021-10-19. Retrieved 2024-05-11.
Kembali kehalaman sebelumnya