SlideShare a Scribd company logo
THE STORY OF
FROM 1997 TO 2015
Yes, L0phtCrack can drink legally now.
HOBBIT'S CIFS RESEARCH PAPER
JANUARY 1997
Jeremy Allison released pwdump on 3/24/1997
Inspired to reverse engineer for Linux to NT interoperability for SAMBA
Can dump password hashes from Windows NT registry but not crack
Jonathan Wilkins released NTCrack on 3/28/1997
Can crack LANMAN hashes only
Mudge released L0phtCrack on 4/11/1997
Cracks both LANMAN and NTLM hashes
Origins of L0phtCrack
For each user, LANMAN hashes
stored alongside NTLM for
backwards compatibility.
LANMAN Passwords uppercased
and split into two 7 character
passwords for hashing.
This scheme persisted until
Windows Vista shipped Jan 2007!
Windows NT Password Hash Refresher
L0PHTCRACK 1.0 4/11/1997
• Core engine written by
Mudge
• GUI version written by
Weld Pond
• Imports hashes from
Jeremy Allison's
PWDUMP
• Microsoft responds with
SYSKEY on 5/15/1997 in
NT4 SP3
• Windows administrators need a GUI
• Put the tools for password cracking in one program
L0phtCrack 1.5 Pivots from POC
to Administrator/Pen Tester Tool
L0PHTCRACK 1.5 7/12/1997
• GUI update to fix Brute
Forcing bugs
• Challenge/Response hash
cracking added
• Built-in hash dumping
• Shareware license
• U.S. Government
Accounting Office
becomes first paying
customer
L0PHTCRACK 2.0 2/16/1998
• Built-in sniffing for
challenge/response
• Ability to import SAM
registry hive added
• First commercial version
with 14-day trial license
L0PHTCRACK 2.5 1/13/1999
• DilDog joins L0pht as to
work on L0phtCrack full-
time.
• DES core rewritten with
optimized assembly
algorithm.
• Hybrid dictionary/brute
attack added
January 2000
L0PHTCRACK 3.0 (PRE) 1/24/2000
• Never Released
• Last Version with L0pht
branding
• Added session-based
interface
• Added L0phtCrack Wizard
• Added import from
remote registry
LC3 (SST) 4/6/2001
• Released by "Security
Software Technologies"
• Added 'distributed'
cracking
• SST not allowed to use
L0pht name on
L0phtCrack, 'LC' used
instead.
LC3 (@stake) 5/18/2001
• Three versions:
Professional, Admin, and
Consultant
LC4 (@stake) 5/14/2002
• Rob Cheyne added to
team
• GUI improvements:
sorting, exporting, SCBS
code pages
• Hybrid mode improved to
use more combinations
• Multiple dictionary
support
LC5 (@stake) 9/2/2004
• Ian Melven added to
team, uncredited
• Windows 2003 update,
better packet sniffer
• Rainbow Tables added
• Audit Scheduling
• Windows Domain
Remediation
• Support Options
September 16, 2004
FOUR YEARS PASS...
December 31, 2008
L0phtCrack 6 3/11/2009
• Original development
team, DilDog, Weld Pond,
Mudge, purchase LC back
from Symantec.
• UI Modernization
• 21 Service releases and
updates through to 2015
• Support for 64-bit,
Windows Vista, and
Windows 7, and Windows
Server up to 2012r2
• Basic Unix Hash Support
Goals Of L0phtCrack Today
• Put all the tools for password auditing in one program
• Make it easy for the enterprise to adopt with remediation and
reports
• Support modern hardware, operating systems, and hash
formats
• Support more than just Windows
• Include more of the security community!
Challenges
• Better ways to extract hashes.
• Remote extraction is more difficult these days, remote UAC,
firewalls
• Sniffer out of date
• GPU challenges: Keeping the GPU fully busy. Not all GPUs are
that fast, CPU can be faster!
ANNOUNCING
Early 2016
L0phtCrack 7 Early 2016
• Complete code overhaul
by DilDog. 100% new
codebase.
• Converted from MFC to Qt
for eventual portability
• New cracking engine
based on John The Ripper
• Multi-GPU OpenCL, CUDA
and CPU multi-core
• SSSE3, SSE4.1, AVX, XOP,
AVX2 optimizations,
L0phtCrack 7 Early 2016
• JtR complex wordlist
rules
• Full Unicode and
character set support
• Queue-based operation
• Completely overhauled
scheduler
• Full Unix support for
Linux, Solaris, BSD and
AIX hashes w/ssh remote
extraction.
• Automatic update
notification
L0phtCrack 7 Early 2016
Calibration selects which
hardware and algorithms
fastest
Completely Pluggable API
• Open Source API allows third-party plugins to work with L0phtCrack.
Beginning of a software ecosystem
• All features in L0phtCrack are implemented as plugins using the API.
• API is beta, will be released shortly after launch, available on
GitHub.
• Non-core features to be moved to plugins
Pluggable Units of IBM 604 calculator from 1948.
Ran at 50 kHz.
Future Directions
• Mac OS X support.
• Port GUI to OS X and Linux
• Support for other cracking engines.
• Hint: hashcat and oclHashcat now open source
• Enterprise reporting/analytics
• More import modules, such as creddump, mimikatz, volume
shadow copy, etc.
• Wireshark plugin for sniffing
• Database hashes
• More than just password cracking!
• Add support for Nmap
• Network inventory
THANK YOU!
Chris Wysopal
@weldpond
support@l0phtcrack.com

More Related Content

What's hot

Deploying Kafka Streams Applications with Docker and Kubernetes
Deploying Kafka Streams Applications with Docker and KubernetesDeploying Kafka Streams Applications with Docker and Kubernetes
Deploying Kafka Streams Applications with Docker and Kubernetes
confluent
 
IEEE 802.11 Project
IEEE 802.11 ProjectIEEE 802.11 Project
IEEE 802.11 Project
United International University
 
Cassandra presentation at NoSQL
Cassandra presentation at NoSQLCassandra presentation at NoSQL
Cassandra presentation at NoSQL
Evan Weaver
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS Protocol
Netwax Lab
 
Open source tools for e signature - yajug - v3
Open source tools for e signature - yajug - v3Open source tools for e signature - yajug - v3
Open source tools for e signature - yajug - v3
David Naramski
 
Building high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache ThriftBuilding high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache Thrift
RX-M Enterprises LLC
 
FreeRTOS
FreeRTOSFreeRTOS
An introduction to Struts 2 and RESTful applications
An introduction to Struts 2 and RESTful applicationsAn introduction to Struts 2 and RESTful applications
An introduction to Struts 2 and RESTful applications
mrdon
 
Https presentation
Https presentationHttps presentation
Https presentation
patel jatin
 
카프카, 산전수전 노하우
카프카, 산전수전 노하우카프카, 산전수전 노하우
카프카, 산전수전 노하우
if kakao
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Prometheus-Grafana-RahulSoni1584KnolX.pptx.pdf
Prometheus-Grafana-RahulSoni1584KnolX.pptx.pdfPrometheus-Grafana-RahulSoni1584KnolX.pptx.pdf
Prometheus-Grafana-RahulSoni1584KnolX.pptx.pdf
Knoldus Inc.
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
Manusha Dilan
 
Kubernetes Problem-Solving
Kubernetes Problem-SolvingKubernetes Problem-Solving
Kubernetes Problem-Solving
All Things Open
 
Apaceh Ambari Overview
Apaceh Ambari OverviewApaceh Ambari Overview
Apaceh Ambari Overview
JEONGPHIL HAN
 
Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
Robin Harris
 
KSQL: Streaming SQL for Kafka
KSQL: Streaming SQL for KafkaKSQL: Streaming SQL for Kafka
KSQL: Streaming SQL for Kafka
confluent
 

What's hot (20)

Deploying Kafka Streams Applications with Docker and Kubernetes
Deploying Kafka Streams Applications with Docker and KubernetesDeploying Kafka Streams Applications with Docker and Kubernetes
Deploying Kafka Streams Applications with Docker and Kubernetes
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
 
IEEE 802.11 Project
IEEE 802.11 ProjectIEEE 802.11 Project
IEEE 802.11 Project
 
Cassandra presentation at NoSQL
Cassandra presentation at NoSQLCassandra presentation at NoSQL
Cassandra presentation at NoSQL
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS Protocol
 
Open source tools for e signature - yajug - v3
Open source tools for e signature - yajug - v3Open source tools for e signature - yajug - v3
Open source tools for e signature - yajug - v3
 
Building high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache ThriftBuilding high performance microservices in finance with Apache Thrift
Building high performance microservices in finance with Apache Thrift
 
FreeRTOS
FreeRTOSFreeRTOS
FreeRTOS
 
Vlan final
Vlan finalVlan final
Vlan final
 
Hydra
HydraHydra
Hydra
 
An introduction to Struts 2 and RESTful applications
An introduction to Struts 2 and RESTful applicationsAn introduction to Struts 2 and RESTful applications
An introduction to Struts 2 and RESTful applications
 
Https presentation
Https presentationHttps presentation
Https presentation
 
카프카, 산전수전 노하우
카프카, 산전수전 노하우카프카, 산전수전 노하우
카프카, 산전수전 노하우
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Prometheus-Grafana-RahulSoni1584KnolX.pptx.pdf
Prometheus-Grafana-RahulSoni1584KnolX.pptx.pdfPrometheus-Grafana-RahulSoni1584KnolX.pptx.pdf
Prometheus-Grafana-RahulSoni1584KnolX.pptx.pdf
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Kubernetes Problem-Solving
Kubernetes Problem-SolvingKubernetes Problem-Solving
Kubernetes Problem-Solving
 
Apaceh Ambari Overview
Apaceh Ambari OverviewApaceh Ambari Overview
Apaceh Ambari Overview
 
Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
 
KSQL: Streaming SQL for Kafka
KSQL: Streaming SQL for KafkaKSQL: Streaming SQL for Kafka
KSQL: Streaming SQL for Kafka
 

Viewers also liked

Nigerian design and digital marketing agency
Nigerian design and digital marketing agencyNigerian design and digital marketing agency
Nigerian design and digital marketing agency
Samson Aligba
 
VideoLan VLC Player App Artifact Report
VideoLan VLC Player App Artifact ReportVideoLan VLC Player App Artifact Report
VideoLan VLC Player App Artifact Report
Aziz Sasmaz
 
Machine Learning and Hadoop: Present and Future
Machine Learning and Hadoop: Present and FutureMachine Learning and Hadoop: Present and Future
Machine Learning and Hadoop: Present and Future
Data Science London
 
Intro to linux performance analysis
Intro to linux performance analysisIntro to linux performance analysis
Intro to linux performance analysis
Chris McEniry
 
Samsung mobile root
Samsung mobile rootSamsung mobile root
Samsung mobile root
Black Peacocks
 
脆弱性診断って何をどうすればいいの?(おかわり)
脆弱性診断って何をどうすればいいの?(おかわり)脆弱性診断って何をどうすればいいの?(おかわり)
脆弱性診断って何をどうすればいいの?(おかわり)
脆弱性診断研究会
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Falgun Rathod
 
Dangerous google dorks
Dangerous google dorksDangerous google dorks
Dangerous google dorks
Witgie Solutions
 
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
 
Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...
Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...
Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...
Giovanni Marco Dall'Olio
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Ravi Rajput
 
Hacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtHacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav Bisht
Raghav Bisht
 
Learning sed and awk
Learning sed and awkLearning sed and awk
Learning sed and awk
Yogesh Sawant
 
Nmap 9 truth "Nothing to say any more"
Nmap 9 truth "Nothing to say  any more"Nmap 9 truth "Nothing to say  any more"
Nmap 9 truth "Nothing to say any more"
abend_cve_9999_0001
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Linux intro 4 awk + makefile
Linux intro 4  awk + makefileLinux intro 4  awk + makefile
Linux intro 4 awk + makefile
Giovanni Marco Dall'Olio
 
Linux intro 5 extra: makefiles
Linux intro 5 extra: makefilesLinux intro 5 extra: makefiles
Linux intro 5 extra: makefiles
Giovanni Marco Dall'Olio
 
Linux intro 2 basic terminal
Linux intro 2   basic terminalLinux intro 2   basic terminal
Linux intro 2 basic terminal
Giovanni Marco Dall'Olio
 
Linux intro 5 extra: awk
Linux intro 5 extra: awkLinux intro 5 extra: awk
Linux intro 5 extra: awk
Giovanni Marco Dall'Olio
 

Viewers also liked (20)

Nigerian design and digital marketing agency
Nigerian design and digital marketing agencyNigerian design and digital marketing agency
Nigerian design and digital marketing agency
 
VideoLan VLC Player App Artifact Report
VideoLan VLC Player App Artifact ReportVideoLan VLC Player App Artifact Report
VideoLan VLC Player App Artifact Report
 
Machine Learning and Hadoop: Present and Future
Machine Learning and Hadoop: Present and FutureMachine Learning and Hadoop: Present and Future
Machine Learning and Hadoop: Present and Future
 
Intro to linux performance analysis
Intro to linux performance analysisIntro to linux performance analysis
Intro to linux performance analysis
 
Samsung mobile root
Samsung mobile rootSamsung mobile root
Samsung mobile root
 
脆弱性診断って何をどうすればいいの?(おかわり)
脆弱性診断って何をどうすればいいの?(おかわり)脆弱性診断って何をどうすればいいの?(おかわり)
脆弱性診断って何をどうすればいいの?(おかわり)
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
 
Dangerous google dorks
Dangerous google dorksDangerous google dorks
Dangerous google dorks
 
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
 
Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...
Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...
Thesis defence of Dall'Olio Giovanni Marco. Applications of network theory to...
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
 
Hacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtHacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav Bisht
 
Learning sed and awk
Learning sed and awkLearning sed and awk
Learning sed and awk
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Nmap 9 truth "Nothing to say any more"
Nmap 9 truth "Nothing to say  any more"Nmap 9 truth "Nothing to say  any more"
Nmap 9 truth "Nothing to say any more"
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Linux intro 4 awk + makefile
Linux intro 4  awk + makefileLinux intro 4  awk + makefile
Linux intro 4 awk + makefile
 
Linux intro 5 extra: makefiles
Linux intro 5 extra: makefilesLinux intro 5 extra: makefiles
Linux intro 5 extra: makefiles
 
Linux intro 2 basic terminal
Linux intro 2   basic terminalLinux intro 2   basic terminal
Linux intro 2 basic terminal
 
Linux intro 5 extra: awk
Linux intro 5 extra: awkLinux intro 5 extra: awk
Linux intro 5 extra: awk
 

Similar to History of L0phtCrack

OSDC 2016 - Ingesting Logs with Style by Pere Urbon-Bayes
OSDC 2016 - Ingesting Logs with Style by Pere Urbon-BayesOSDC 2016 - Ingesting Logs with Style by Pere Urbon-Bayes
OSDC 2016 - Ingesting Logs with Style by Pere Urbon-Bayes
NETWAYS
 
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and WalkthroughFirst Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
Emulex Corporation
 
Status of Embedded Linux
Status of Embedded LinuxStatus of Embedded Linux
Status of Embedded Linux
LinuxCon ContainerCon CloudOpen China
 
Evolution of .NET Framework and Features of different versions
Evolution of .NET Framework and Features of different versionsEvolution of .NET Framework and Features of different versions
Evolution of .NET Framework and Features of different versions
Nilanshu Srivastava
 
Evolution of .net frame work
Evolution of .net frame workEvolution of .net frame work
Evolution of .net frame work
vc7722
 
FMXLinux Introduction - Delphi's FireMonkey for Linux
FMXLinux Introduction - Delphi's FireMonkey for LinuxFMXLinux Introduction - Delphi's FireMonkey for Linux
FMXLinux Introduction - Delphi's FireMonkey for Linux
Embarcadero Technologies
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
banwait
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
banwait
 
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
Shawn Wells
 
SC'16 PMIx BoF Presentation
SC'16 PMIx BoF PresentationSC'16 PMIx BoF Presentation
SC'16 PMIx BoF Presentation
rcastain
 
Open MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOFOpen MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOF
Jeff Squyres
 
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community) [발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
동현 김
 
Linux Servers
Linux ServersLinux Servers
Linux Servers
Shafaan Khaliq Bhatti
 
The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10
mark-smith
 
Balázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a TunnelBalázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a Tunnel
hacktivity
 
Microsoft Really Loves Linux – a Virtual Love Story
Microsoft Really Loves Linux – a Virtual Love StoryMicrosoft Really Loves Linux – a Virtual Love Story
Microsoft Really Loves Linux – a Virtual Love Story
Christian Heitkamp
 
Hogy jussunk ki lezárt hálózatokból?
Hogy jussunk ki lezárt hálózatokból?Hogy jussunk ki lezárt hálózatokból?
Hogy jussunk ki lezárt hálózatokból?
hackersuli
 
DevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructure
DevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructureDevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructure
DevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructure
Angelo Failla
 
Is That A Penguin In My Windows?
Is That A Penguin In My Windows?Is That A Penguin In My Windows?
Is That A Penguin In My Windows?
zeroSteiner
 
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDNTech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
nvirters
 

Similar to History of L0phtCrack (20)

OSDC 2016 - Ingesting Logs with Style by Pere Urbon-Bayes
OSDC 2016 - Ingesting Logs with Style by Pere Urbon-BayesOSDC 2016 - Ingesting Logs with Style by Pere Urbon-Bayes
OSDC 2016 - Ingesting Logs with Style by Pere Urbon-Bayes
 
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and WalkthroughFirst Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
 
Status of Embedded Linux
Status of Embedded LinuxStatus of Embedded Linux
Status of Embedded Linux
 
Evolution of .NET Framework and Features of different versions
Evolution of .NET Framework and Features of different versionsEvolution of .NET Framework and Features of different versions
Evolution of .NET Framework and Features of different versions
 
Evolution of .net frame work
Evolution of .net frame workEvolution of .net frame work
Evolution of .net frame work
 
FMXLinux Introduction - Delphi's FireMonkey for Linux
FMXLinux Introduction - Delphi's FireMonkey for LinuxFMXLinux Introduction - Delphi's FireMonkey for Linux
FMXLinux Introduction - Delphi's FireMonkey for Linux
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
2010-01-28 NSA Open Source User Group Meeting, Current & Future Linux on Syst...
 
SC'16 PMIx BoF Presentation
SC'16 PMIx BoF PresentationSC'16 PMIx BoF Presentation
SC'16 PMIx BoF Presentation
 
Open MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOFOpen MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOF
 
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community) [발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
 
Linux Servers
Linux ServersLinux Servers
Linux Servers
 
The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10The linux kernel hidden inside windows 10
The linux kernel hidden inside windows 10
 
Balázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a TunnelBalázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a Tunnel
 
Microsoft Really Loves Linux – a Virtual Love Story
Microsoft Really Loves Linux – a Virtual Love StoryMicrosoft Really Loves Linux – a Virtual Love Story
Microsoft Really Loves Linux – a Virtual Love Story
 
Hogy jussunk ki lezárt hálózatokból?
Hogy jussunk ki lezárt hálózatokból?Hogy jussunk ki lezárt hálózatokból?
Hogy jussunk ki lezárt hálózatokból?
 
DevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructure
DevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructureDevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructure
DevopsItalia2015 - DHCP at Facebook - Evolution of an infrastructure
 
Is That A Penguin In My Windows?
Is That A Penguin In My Windows?Is That A Penguin In My Windows?
Is That A Penguin In My Windows?
 
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDNTech Tutorial by Vikram Dham: Let's build MPLS router using SDN
Tech Tutorial by Vikram Dham: Let's build MPLS router using SDN
 

Recently uploaded

Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 

Recently uploaded (20)

Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 

History of L0phtCrack

  • 1. THE STORY OF FROM 1997 TO 2015 Yes, L0phtCrack can drink legally now.
  • 2.
  • 3. HOBBIT'S CIFS RESEARCH PAPER JANUARY 1997
  • 4. Jeremy Allison released pwdump on 3/24/1997 Inspired to reverse engineer for Linux to NT interoperability for SAMBA Can dump password hashes from Windows NT registry but not crack Jonathan Wilkins released NTCrack on 3/28/1997 Can crack LANMAN hashes only Mudge released L0phtCrack on 4/11/1997 Cracks both LANMAN and NTLM hashes Origins of L0phtCrack
  • 5. For each user, LANMAN hashes stored alongside NTLM for backwards compatibility. LANMAN Passwords uppercased and split into two 7 character passwords for hashing. This scheme persisted until Windows Vista shipped Jan 2007! Windows NT Password Hash Refresher
  • 6. L0PHTCRACK 1.0 4/11/1997 • Core engine written by Mudge • GUI version written by Weld Pond • Imports hashes from Jeremy Allison's PWDUMP • Microsoft responds with SYSKEY on 5/15/1997 in NT4 SP3
  • 7. • Windows administrators need a GUI • Put the tools for password cracking in one program L0phtCrack 1.5 Pivots from POC to Administrator/Pen Tester Tool
  • 8. L0PHTCRACK 1.5 7/12/1997 • GUI update to fix Brute Forcing bugs • Challenge/Response hash cracking added • Built-in hash dumping • Shareware license • U.S. Government Accounting Office becomes first paying customer
  • 9. L0PHTCRACK 2.0 2/16/1998 • Built-in sniffing for challenge/response • Ability to import SAM registry hive added • First commercial version with 14-day trial license
  • 10. L0PHTCRACK 2.5 1/13/1999 • DilDog joins L0pht as to work on L0phtCrack full- time. • DES core rewritten with optimized assembly algorithm. • Hybrid dictionary/brute attack added
  • 12. L0PHTCRACK 3.0 (PRE) 1/24/2000 • Never Released • Last Version with L0pht branding • Added session-based interface • Added L0phtCrack Wizard • Added import from remote registry
  • 13. LC3 (SST) 4/6/2001 • Released by "Security Software Technologies" • Added 'distributed' cracking • SST not allowed to use L0pht name on L0phtCrack, 'LC' used instead.
  • 14. LC3 (@stake) 5/18/2001 • Three versions: Professional, Admin, and Consultant
  • 15. LC4 (@stake) 5/14/2002 • Rob Cheyne added to team • GUI improvements: sorting, exporting, SCBS code pages • Hybrid mode improved to use more combinations • Multiple dictionary support
  • 16. LC5 (@stake) 9/2/2004 • Ian Melven added to team, uncredited • Windows 2003 update, better packet sniffer • Rainbow Tables added • Audit Scheduling • Windows Domain Remediation • Support Options
  • 20. L0phtCrack 6 3/11/2009 • Original development team, DilDog, Weld Pond, Mudge, purchase LC back from Symantec. • UI Modernization • 21 Service releases and updates through to 2015 • Support for 64-bit, Windows Vista, and Windows 7, and Windows Server up to 2012r2 • Basic Unix Hash Support
  • 21. Goals Of L0phtCrack Today • Put all the tools for password auditing in one program • Make it easy for the enterprise to adopt with remediation and reports • Support modern hardware, operating systems, and hash formats • Support more than just Windows • Include more of the security community!
  • 22. Challenges • Better ways to extract hashes. • Remote extraction is more difficult these days, remote UAC, firewalls • Sniffer out of date • GPU challenges: Keeping the GPU fully busy. Not all GPUs are that fast, CPU can be faster!
  • 24. L0phtCrack 7 Early 2016 • Complete code overhaul by DilDog. 100% new codebase. • Converted from MFC to Qt for eventual portability • New cracking engine based on John The Ripper • Multi-GPU OpenCL, CUDA and CPU multi-core • SSSE3, SSE4.1, AVX, XOP, AVX2 optimizations,
  • 25. L0phtCrack 7 Early 2016 • JtR complex wordlist rules • Full Unicode and character set support • Queue-based operation • Completely overhauled scheduler • Full Unix support for Linux, Solaris, BSD and AIX hashes w/ssh remote extraction. • Automatic update notification
  • 26. L0phtCrack 7 Early 2016 Calibration selects which hardware and algorithms fastest
  • 27. Completely Pluggable API • Open Source API allows third-party plugins to work with L0phtCrack. Beginning of a software ecosystem • All features in L0phtCrack are implemented as plugins using the API. • API is beta, will be released shortly after launch, available on GitHub. • Non-core features to be moved to plugins Pluggable Units of IBM 604 calculator from 1948. Ran at 50 kHz.
  • 28. Future Directions • Mac OS X support. • Port GUI to OS X and Linux • Support for other cracking engines. • Hint: hashcat and oclHashcat now open source • Enterprise reporting/analytics • More import modules, such as creddump, mimikatz, volume shadow copy, etc. • Wireshark plugin for sniffing • Database hashes • More than just password cracking! • Add support for Nmap • Network inventory

Editor's Notes

  1. Personal intro Its been a bit of a cat and mouse game with Microsoft over many years. Surprisingly L0phtCrack has been owned by 5 organizations over the years.
  2. I saw this sign on my way home from the pub last night in Cambridge so of course I had to use it.
  3. Many think windows password crackers started with Jeremy Allison but Hobbits research was a precursor. Dan Farmer’s pwc which was part of COPS in 1990 and Alec Muffet’s crack (1993) were the first password crackers for Unix.
  4. NTLM is easy once you have the LANMAN as you can just cycle through all the casing posibilities.
  5. Microsoft had originally claimed it would take years to crack. Even though they used no salt. Reverse engineering and attack tools are a requirement for assessing security. Making the theoretical practical.
  6. SYSKEY of course was just security theater. It took 10 years for microsoft to remove lanman hash by default
  7. Creating a GUI enabled another class of users. Windows administrators.
  8. Samdump functionality. Of course the licensing was cracked right away.
  9. Revenue from selling L0phtCrack now allows some of the L0pht members to become full time employees.
  10. Didn’t sell any tools or technology. Just the people and brand.
  11. Not allowed to use the l0pht brand.
  12. You can see from the look and feel it is losing its underground edge. And frankly it was falling a bit behind the state of the art. John the ripper had better wordlist rules.
  13. This almost doomed L0phtCrack. A funny thing happened along the way. McAfee started flagging lc5 as a malicious tool!
  14. Symantec End of Lifes LC5. We approach Symantec and purchase the technology and name.
  15. L0phtCrack gets its name back! In the transaction we also got the l0pht name back.
  16. So I am happy to say L0phtCrack is alive and well today and we are still developing it.
  17. So you can tell from the investment we are making in L0phtCrack 7 that we think passwords in Windows and Unix will be around for a long time. It was 10 years before Microsoft felt safe removing LM hash.