RE: Password Cracking

From: Oguzhan AKYUZ (oakyuz_at_lycos.com)
Date: 09/09/04

  • Next message: Hamish Stanaway: "Re: RE: a tool like nestat"
    To: "Prasanna M" <PrasannaM@catsglobal.co.in>, "'security-basics@securityfocus.com'" <security-basics@securityfocus.com>
    Date: Thu, 09 Sep 2004 04:23:23 -0500
    
    

    LC is a program for password auditing, recovering. You may look at its web site:

    http://www.atstake.com/products/lc/

    ----- Original Message -----
    From: Prasanna M <PrasannaM@catsglobal.co.in>
    Date: Wed, 8 Sep 2004 12:46:00 +0530
    To: "'security-basics@securityfocus.com'" <security-basics@securityfocus.com>
    Subject: RE: Password Cracking

    > just what are LC & John? (am new to security domain, sry) :-D
    > Prasanna
    >
    > -----Original Message-----
    > From: Simon Zuckerbraun
    >
    > Sent: 9/5/2004 8:34 AM
    > Subject: RE: Password Cracking
    >
    > If I understand correctly, LC is capable of doing what you're asking.
    >
    > Simon
    >
    > -----Original Message-----
    > From: Eoin Fleming [mailto:rtfm@o2.ie]
    > Sent: Friday, August 27, 2004 4:44 PM
    >
    > Subject: Password Cracking
    >
    >
    > Bit of an unusual one -
    >
    > Lets imagine you are a security administrator at a company - strong
    > passwords are enforced but you suspect that there may be exceptions and
    > you want to raise management awareness of breaches of the password
    > policy BUT you can't run cracking software as then you will know
    > individuals passwords - which you don't want to know as this breaks
    > acountability rather nicely.
    >
    > In short - is there software that can perform the function of LC and
    > John without giving the admin the password but rather rate the password
    > against against a set criteria?
    >
    > ---------------------------------------------------------------------------
    > Computer Forensics Training at the InfoSec Institute. All of our class sizes
    > are guaranteed to be 12 students or less to facilitate one-on-one
    > interaction with one of our expert instructors. Gain the in-demand skills of
    > a certified computer examiner, learn to recover trace data left behind by
    > fraud, theft, and cybercrime perpetrators. Discover the source of computer
    > crime and abuse so that it never happens again.
    >
    > http://www.infosecinstitute.com/courses/computer_forensics_training.html
    > ----------------------------------------------------------------------------
    >

    -- 
    _______________________________________________
    Find what you are looking for with the Lycos Yellow Pages
    http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10
    ---------------------------------------------------------------------------
    Computer Forensics Training at the InfoSec Institute. All of our class sizes
    are guaranteed to be 12 students or less to facilitate one-on-one
    interaction with one of our expert instructors. Gain the in-demand skills of
    a certified computer examiner, learn to recover trace data left behind by
    fraud, theft, and cybercrime perpetrators. Discover the source of computer
    crime and abuse so that it never happens again.
    http://www.infosecinstitute.com/courses/computer_forensics_training.html
    ----------------------------------------------------------------------------
    

  • Next message: Hamish Stanaway: "Re: RE: a tool like nestat"