l0phtcrack - Microsoft LANMAN/NT password sniffer/cracker
This commit is contained in:
parent
9477c49d27
commit
4f2c12f730
41
security/l0phtcrack/Makefile
Normal file
41
security/l0phtcrack/Makefile
Normal file
@ -0,0 +1,41 @@
|
||||
# Makefile for: l0phtcrack
|
||||
# Version required: 2.52
|
||||
# Date created: 25 Nov 1999
|
||||
# Whom: dugsong@monkey.org
|
||||
#
|
||||
# $OpenBSD: Makefile,v 1.1.1.1 1999/12/05 18:19:56 dugsong Exp $
|
||||
|
||||
PKGNAME= l0phtcrack-2.52
|
||||
|
||||
CATEGORIES= security
|
||||
|
||||
MAINTAINER= dugsong@monkey.org
|
||||
|
||||
DIST_SUBDIR= l0phtcrack
|
||||
DISTFILES= lcsrc${EXTRACT_SUFX} readsmb.c
|
||||
EXTRACT_ONLY= lcsrc${EXTRACT_SUFX}
|
||||
USE_ZIP= yes
|
||||
|
||||
MASTER_SITES= http://www.l0pht.com/l0phtcrack/dist/
|
||||
|
||||
NO_WRKSUBDIR= yes
|
||||
|
||||
NO_CONFIGURE= yes
|
||||
|
||||
post-extract:
|
||||
@cp ${FULLDISTDIR}/readsmb.c ${WRKSRC}
|
||||
@(cd ${WRKSRC} ; \
|
||||
for file in * ; do \
|
||||
tr -d '\r' < $$file > $$file.new ; \
|
||||
mv $$file.new $$file ; \
|
||||
done)
|
||||
|
||||
do-install:
|
||||
${INSTALL_PROGRAM} ${WRKSRC}/lc ${PREFIX}/sbin/l0phtcrack
|
||||
${INSTALL_PROGRAM} ${WRKSRC}/readsmb ${PREFIX}/sbin
|
||||
${INSTALL_DATA_DIR} ${PREFIX}/share/l0phtcrack
|
||||
${INSTALL_DATA} ${WRKSRC}/wfile.txt ${PREFIX}/share/l0phtcrack
|
||||
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/l0phtcrack
|
||||
${INSTALL_DATA} ${WRKSRC}/readme.txt ${PREFIX}/share/doc/l0phtcrack
|
||||
|
||||
.include <bsd.port.mk>
|
6
security/l0phtcrack/files/md5
Normal file
6
security/l0phtcrack/files/md5
Normal file
@ -0,0 +1,6 @@
|
||||
MD5 (l0phtcrack/lcsrc.zip) = 4012199e6d522b47c35be4b12c505dd3
|
||||
MD5 (l0phtcrack/readsmb.c) = e508d953092c1925a2186463e19b48de
|
||||
RMD160 (l0phtcrack/lcsrc.zip) = eb2fe38d30b33579ee73fd74d88011f62b5b16f0
|
||||
RMD160 (l0phtcrack/readsmb.c) = bb1455d802eb4dfec2cadb6cdbe9e75eeedb5585
|
||||
SHA1 (l0phtcrack/lcsrc.zip) = cb7f036486e195ab08256043b9ab476417aa2ebf
|
||||
SHA1 (l0phtcrack/readsmb.c) = 746e05f64f85dfbd4faf1223be74f10fe33e7e16
|
57
security/l0phtcrack/patches/patch-aa
Normal file
57
security/l0phtcrack/patches/patch-aa
Normal file
@ -0,0 +1,57 @@
|
||||
--- Makefile.orig Tue Nov 23 09:30:54 1999
|
||||
+++ Makefile Tue Nov 23 09:53:09 1999
|
||||
@@ -2,15 +2,15 @@
|
||||
|
||||
# C compiler
|
||||
#CC=cc
|
||||
-CC=gcc
|
||||
+#CC=gcc
|
||||
|
||||
# Uncomment the following to add symbols to the code for debugging
|
||||
-DEBUG=-g -Wall
|
||||
+#DEBUG=-g -Wall
|
||||
#DEBUG=-D_DEBUG
|
||||
|
||||
# Optimization for the compiler
|
||||
#OPTIMIZE=
|
||||
-OPTIMIZE=-O2
|
||||
+#OPTIMIZE=-O2
|
||||
|
||||
# Choose your architecture
|
||||
# note that if you are on a big-endian machine like SUN's
|
||||
@@ -18,9 +18,9 @@
|
||||
# the correct order yet. You're on your own right now.
|
||||
#
|
||||
# FreeBSD
|
||||
-ARCH=-DMPU8086
|
||||
-STATIC=
|
||||
-XLIBS=
|
||||
+#ARCH=-DMPU8086
|
||||
+#STATIC=
|
||||
+#XLIBS=
|
||||
#
|
||||
# SUNOS
|
||||
#ARCH=-DBIGENDIAN
|
||||
@@ -47,13 +47,18 @@
|
||||
#OPTIMIZE=
|
||||
#XLIBS=
|
||||
|
||||
-CFLAGS= $(DEBUG) $(OPTIMIZE) $(ARCH) $(VISUAL) $(PERMUTE) $(STATIC)
|
||||
+#CFLAGS= $(DEBUG) $(OPTIMIZE) $(ARCH) $(VISUAL) $(PERMUTE) $(STATIC)
|
||||
|
||||
-OBJS = des_enc.o ecb_enc.o llist.o md4.o util.o ztest.o set_key.o chal_resp.o
|
||||
+OBJS = llist.o md4.o util.o ztest.o set_key.o chal_resp.o
|
||||
+
|
||||
+all: lc readsmb
|
||||
|
||||
lc: $(OBJS)
|
||||
- $(CC) $(CFLAGS) $(XLIBS) -o lc_CLI $(OBJS)
|
||||
+ $(CC) $(CFLAGS) $(XLIBS) -o lc $(OBJS) -ldes
|
||||
+
|
||||
+readsmb: readsmb.c
|
||||
+ $(CC) -o $@ readsmb.c -lpcap
|
||||
|
||||
clean:
|
||||
- rm -f core *.o lc_CLI
|
||||
+ rm -f core *.o lc readsmb
|
||||
|
21
security/l0phtcrack/patches/patch-ab
Normal file
21
security/l0phtcrack/patches/patch-ab
Normal file
@ -0,0 +1,21 @@
|
||||
--- includes.h.orig Tue Nov 23 09:30:54 1999
|
||||
+++ includes.h Tue Nov 23 09:54:15 1999
|
||||
@@ -1,9 +1,17 @@
|
||||
#include "md4.h"
|
||||
-#include "des.h"
|
||||
+#include <des.h>
|
||||
#include <memory.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <ctype.h>
|
||||
+#include <machine/endian.h>
|
||||
+
|
||||
+/* XXX */
|
||||
+#if BYTE_ORDER == BIG_ENDIAN
|
||||
+# define BIGENDIAN
|
||||
+#else
|
||||
+# define MPU8086
|
||||
+#endif
|
||||
|
||||
typedef short int16;
|
||||
typedef int int32;
|
43
security/l0phtcrack/patches/patch-ac
Normal file
43
security/l0phtcrack/patches/patch-ac
Normal file
@ -0,0 +1,43 @@
|
||||
--- readsmb.c.orig Tue Nov 23 09:36:00 1999
|
||||
+++ readsmb.c Tue Nov 23 09:38:48 1999
|
||||
@@ -44,16 +44,17 @@
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
-#include <asm/signal.h>
|
||||
-#ifdef __FreeBSD__
|
||||
+#include <sys/param.h>
|
||||
+#include <signal.h>
|
||||
+#ifdef BSD
|
||||
#include <sys/socket.h>
|
||||
-#endif /* __FreeBSD__ */
|
||||
+#endif /* BSD */
|
||||
#ifdef __sun /* Solaris 2.x */
|
||||
#define u_int32_t uint32_t
|
||||
#include <sys/socket.h>
|
||||
-#endif /* Not FreeBSD, not Solaris. Our default is Linux */
|
||||
+#endif /* Not BSD, not Solaris. Our default is Linux */
|
||||
#include <net/if.h>
|
||||
-#include "pcap.h"
|
||||
+#include <pcap.h>
|
||||
|
||||
#define FILTER_CMD "src port 139 or dst port 139"
|
||||
#define TRUE (1)
|
||||
@@ -86,7 +87,7 @@
|
||||
int current_pkt_type = 0;
|
||||
int neg_prot, pw_offset, sk_offset, user_offset;
|
||||
|
||||
-void *
|
||||
+void
|
||||
killed (int sig)
|
||||
{
|
||||
fflush (log);
|
||||
@@ -330,7 +331,7 @@
|
||||
free (pc6);
|
||||
return (lmhash);
|
||||
}
|
||||
-void
|
||||
+int
|
||||
main (int argc, char **argv)
|
||||
{
|
||||
char *cur_pkt, *next_pkt;
|
1
security/l0phtcrack/pkg/COMMENT
Normal file
1
security/l0phtcrack/pkg/COMMENT
Normal file
@ -0,0 +1 @@
|
||||
Microsoft LANMAN & NT password sniffer/cracker
|
11
security/l0phtcrack/pkg/DESCR
Normal file
11
security/l0phtcrack/pkg/DESCR
Normal file
@ -0,0 +1,11 @@
|
||||
from readme.txt:
|
||||
|
||||
L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password
|
||||
hashes back into the original clear text passwords. The program
|
||||
does this using dictionary cracking and also brute force. L0phtCrack
|
||||
1.5 returns not just the LANMAN passord but the NT password up to 14
|
||||
characters in length.
|
||||
|
||||
this port also includes readsmb, which will sniff the hashes for you.
|
||||
|
||||
-d.
|
6
security/l0phtcrack/pkg/PLIST
Normal file
6
security/l0phtcrack/pkg/PLIST
Normal file
@ -0,0 +1,6 @@
|
||||
sbin/l0phtcrack
|
||||
sbin/readsmb
|
||||
share/l0phtcrack/wfile.txt
|
||||
share/doc/l0phtcrack/readme.txt
|
||||
@dirrm share/doc/l0phtcrack
|
||||
@dirrm share/l0phtcrack
|
Loading…
Reference in New Issue
Block a user