l0phtcrack - Microsoft LANMAN/NT password sniffer/cracker

This commit is contained in:
dugsong 1999-12-05 18:19:56 +00:00
parent 9477c49d27
commit 4f2c12f730
8 changed files with 186 additions and 0 deletions

View File

@ -0,0 +1,41 @@
# Makefile for: l0phtcrack
# Version required: 2.52
# Date created: 25 Nov 1999
# Whom: dugsong@monkey.org
#
# $OpenBSD: Makefile,v 1.1.1.1 1999/12/05 18:19:56 dugsong Exp $
PKGNAME= l0phtcrack-2.52
CATEGORIES= security
MAINTAINER= dugsong@monkey.org
DIST_SUBDIR= l0phtcrack
DISTFILES= lcsrc${EXTRACT_SUFX} readsmb.c
EXTRACT_ONLY= lcsrc${EXTRACT_SUFX}
USE_ZIP= yes
MASTER_SITES= http://www.l0pht.com/l0phtcrack/dist/
NO_WRKSUBDIR= yes
NO_CONFIGURE= yes
post-extract:
@cp ${FULLDISTDIR}/readsmb.c ${WRKSRC}
@(cd ${WRKSRC} ; \
for file in * ; do \
tr -d '\r' < $$file > $$file.new ; \
mv $$file.new $$file ; \
done)
do-install:
${INSTALL_PROGRAM} ${WRKSRC}/lc ${PREFIX}/sbin/l0phtcrack
${INSTALL_PROGRAM} ${WRKSRC}/readsmb ${PREFIX}/sbin
${INSTALL_DATA_DIR} ${PREFIX}/share/l0phtcrack
${INSTALL_DATA} ${WRKSRC}/wfile.txt ${PREFIX}/share/l0phtcrack
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/l0phtcrack
${INSTALL_DATA} ${WRKSRC}/readme.txt ${PREFIX}/share/doc/l0phtcrack
.include <bsd.port.mk>

View File

@ -0,0 +1,6 @@
MD5 (l0phtcrack/lcsrc.zip) = 4012199e6d522b47c35be4b12c505dd3
MD5 (l0phtcrack/readsmb.c) = e508d953092c1925a2186463e19b48de
RMD160 (l0phtcrack/lcsrc.zip) = eb2fe38d30b33579ee73fd74d88011f62b5b16f0
RMD160 (l0phtcrack/readsmb.c) = bb1455d802eb4dfec2cadb6cdbe9e75eeedb5585
SHA1 (l0phtcrack/lcsrc.zip) = cb7f036486e195ab08256043b9ab476417aa2ebf
SHA1 (l0phtcrack/readsmb.c) = 746e05f64f85dfbd4faf1223be74f10fe33e7e16

View File

@ -0,0 +1,57 @@
--- Makefile.orig Tue Nov 23 09:30:54 1999
+++ Makefile Tue Nov 23 09:53:09 1999
@@ -2,15 +2,15 @@
# C compiler
#CC=cc
-CC=gcc
+#CC=gcc
# Uncomment the following to add symbols to the code for debugging
-DEBUG=-g -Wall
+#DEBUG=-g -Wall
#DEBUG=-D_DEBUG
# Optimization for the compiler
#OPTIMIZE=
-OPTIMIZE=-O2
+#OPTIMIZE=-O2
# Choose your architecture
# note that if you are on a big-endian machine like SUN's
@@ -18,9 +18,9 @@
# the correct order yet. You're on your own right now.
#
# FreeBSD
-ARCH=-DMPU8086
-STATIC=
-XLIBS=
+#ARCH=-DMPU8086
+#STATIC=
+#XLIBS=
#
# SUNOS
#ARCH=-DBIGENDIAN
@@ -47,13 +47,18 @@
#OPTIMIZE=
#XLIBS=
-CFLAGS= $(DEBUG) $(OPTIMIZE) $(ARCH) $(VISUAL) $(PERMUTE) $(STATIC)
+#CFLAGS= $(DEBUG) $(OPTIMIZE) $(ARCH) $(VISUAL) $(PERMUTE) $(STATIC)
-OBJS = des_enc.o ecb_enc.o llist.o md4.o util.o ztest.o set_key.o chal_resp.o
+OBJS = llist.o md4.o util.o ztest.o set_key.o chal_resp.o
+
+all: lc readsmb
lc: $(OBJS)
- $(CC) $(CFLAGS) $(XLIBS) -o lc_CLI $(OBJS)
+ $(CC) $(CFLAGS) $(XLIBS) -o lc $(OBJS) -ldes
+
+readsmb: readsmb.c
+ $(CC) -o $@ readsmb.c -lpcap
clean:
- rm -f core *.o lc_CLI
+ rm -f core *.o lc readsmb

View File

@ -0,0 +1,21 @@
--- includes.h.orig Tue Nov 23 09:30:54 1999
+++ includes.h Tue Nov 23 09:54:15 1999
@@ -1,9 +1,17 @@
#include "md4.h"
-#include "des.h"
+#include <des.h>
#include <memory.h>
#include <string.h>
#include <stdlib.h>
#include <ctype.h>
+#include <machine/endian.h>
+
+/* XXX */
+#if BYTE_ORDER == BIG_ENDIAN
+# define BIGENDIAN
+#else
+# define MPU8086
+#endif
typedef short int16;
typedef int int32;

View File

@ -0,0 +1,43 @@
--- readsmb.c.orig Tue Nov 23 09:36:00 1999
+++ readsmb.c Tue Nov 23 09:38:48 1999
@@ -44,16 +44,17 @@
#include <stdio.h>
#include <string.h>
#include <unistd.h>
-#include <asm/signal.h>
-#ifdef __FreeBSD__
+#include <sys/param.h>
+#include <signal.h>
+#ifdef BSD
#include <sys/socket.h>
-#endif /* __FreeBSD__ */
+#endif /* BSD */
#ifdef __sun /* Solaris 2.x */
#define u_int32_t uint32_t
#include <sys/socket.h>
-#endif /* Not FreeBSD, not Solaris. Our default is Linux */
+#endif /* Not BSD, not Solaris. Our default is Linux */
#include <net/if.h>
-#include "pcap.h"
+#include <pcap.h>
#define FILTER_CMD "src port 139 or dst port 139"
#define TRUE (1)
@@ -86,7 +87,7 @@
int current_pkt_type = 0;
int neg_prot, pw_offset, sk_offset, user_offset;
-void *
+void
killed (int sig)
{
fflush (log);
@@ -330,7 +331,7 @@
free (pc6);
return (lmhash);
}
-void
+int
main (int argc, char **argv)
{
char *cur_pkt, *next_pkt;

View File

@ -0,0 +1 @@
Microsoft LANMAN & NT password sniffer/cracker

View File

@ -0,0 +1,11 @@
from readme.txt:
L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password
hashes back into the original clear text passwords. The program
does this using dictionary cracking and also brute force. L0phtCrack
1.5 returns not just the LANMAN passord but the NT password up to 14
characters in length.
this port also includes readsmb, which will sniff the hashes for you.
-d.

View File

@ -0,0 +1,6 @@
sbin/l0phtcrack
sbin/readsmb
share/l0phtcrack/wfile.txt
share/doc/l0phtcrack/readme.txt
@dirrm share/doc/l0phtcrack
@dirrm share/l0phtcrack