Shame what happened to Terrahash (previous owner of L0phtCrack). As someone who has purchased several Brutalis cracking rigs, those things were the most badass machines on the market.
Looks like they sold and committed to a bunch of cracking rigs before sourcing enough GPUs right before prices skyrocketed, and were suddenly on the hook for a lot more than they could realistically pay for. Hopefully Jeremi manages to pull through. It's a fantastic company that makes a fantastic product. I'd love to buy some new rigs when they get their supply chain issues figured out.
I haven't thought about Mudge in a long time. If you've ever worked cybersecurity for the government, or in general, you owe him, Brian Oblivion, Space Rogue and the other members of L0pht for opening the door. They were pioneers of responsible disclosure, and brought the problem to light when they testified to Congress in 98 that in 30 minutes they could shut down the Internet. He and the others had uncovered DoS, specifically a BGP DoS that would automatically cascade across the Internet.
L0phtCrack was featured in the Phrack Magazine (53) inside an article written by Aleph1 on attacking PPTP, one of the oldest VPN protocols [1]. Prior to that, Aleph1 has written arguably the most famous article in Phrack Magazine (49) to date [2].
Aleph1 has written arguably the most famous article in Phrack Magazine
Given the number of people, including myself, who consider reading that article a truly formative experiences, you might argue it's one of the most famous/influential articles in programming.
> L0phtCrack is a password auditing and recovery application originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, hybrid attacks, and rainbow tables.
I remember that the binary for L0phtCrack had some sort of software protection included with it, and it took a 1-bit change to be cracked, itself -- a 0x74 to 0x75, iirc (or 0x74 to 0xEB if you're a stickler for doing it right). I don't remember exactly what the protection was, maybe there was some sort of password count limit or time limit. It was a long time ago. I just remember being a little disappointed that it was that easy.
I was a hair's breadth away from expulsion too - exfiltrated .sam files from a PC in the library on a 3.5" floppy. Seems to be quite common experience judging by this thread.
Why did we all get caught? Smart enough to figure that out in your teens, dumb enough to think you can get away with it...
In my case I was operating with a dumbass friend who left a "calling card" on one of the compromised machines.
But as a result of my demonstrative flexing cyber-security activity — I was granted with 'root' credentials on the school's SUSE Linux server… Which apparently at the same time was used as an ISP router for an entire city block.
This granted responsibility, unsurprisingly, turned out to be an extremely effective step to cool my eagerness to hack into all things.
They tried to expel me for this (among other) reason(s) too, though the Vice Principal went to bat for me and instead I was banned from using any computers on school property for the last couple years of high school instead.
Dang this does bring back the memories. What was the other tool I used a lot for reversing. Something ice something... softice debugger. That was also a piece of art.
I went from John the Ripper to L0phtCrack to Hash Cat. Now I want a Quantum computer because for some type of passwords even running Hash Cat on a big GPU farm is too slow because of hashing algorithms.
I used it in ~ 1999-2000 to check password strength in the company I worked for; it was running for 1 minute, for any password that was recovered the owner got a notice to change it immediately. Initially 50% of the passwords were the username and more than 50% were up tp 5 characters long. At that time an 8 char min length was "safe enough" for a company that had no sensitive data other than the payroll.
No. They seem to have been doing a few puff PR pieces recently. Can’t imagine anyone under 30 knows or cares about them.
I guess their main claim to fame was being the first “hacker” group to do PR moderately well and transition into decent careers. Not really even an interesting footnote in history.
I wonder what the reasoning for open sourcing it now. And why not from the get go instead of decades later. Licence choices are obviously up to the authors. But at this point it is more a museum relic than anything practical
The rights to L0phtCrack were purchased about a year ago by a company that made password cracking rigs for large companies to audit their employees passwords. They filed bankruptcy due to the GPU shortage changing their COGS overnight. When payments stopped being made the license reverted back to the author and he open sourced it.
I remember the app but never knew how to pronounce it -- it sounded like (record-scratch)-Crack, or maybe Bill the Cat, in my head. Light? Loft? Lowpft?
[+] [-] px43|4 years ago|reply
Looks like they sold and committed to a bunch of cracking rigs before sourcing enough GPUs right before prices skyrocketed, and were suddenly on the hook for a lot more than they could realistically pay for. Hopefully Jeremi manages to pull through. It's a fantastic company that makes a fantastic product. I'd love to buy some new rigs when they get their supply chain issues figured out.
https://terahash.com/letter-from-ceo
[+] [-] Invictus0|4 years ago|reply
[+] [-] _wldu|4 years ago|reply
[+] [-] throwaway984393|4 years ago|reply
[+] [-] loxias|4 years ago|reply
I'm sUre I'm not alone in having fond memories seeing this. :)
PS: (2 decades since Boston madness!)
[+] [-] arminiusreturns|4 years ago|reply
[+] [-] hexman|4 years ago|reply
[+] [-] Communitivity|4 years ago|reply
Mudge was a musical prodigy and an alum of BBN, one of the key players in creating ARPAnet. His bio is fascinating, and you can find a good treatment of it here: https://www.cybersecurityeducationguides.org/peiter-zatko/
[+] [-] brainwipe|4 years ago|reply
[+] [-] teleforce|4 years ago|reply
[1] The Crumbling Tunnel:
http://phrack.org/issues/53/12.html
[2] Smashing The Stack For Fun And Profit:
http://phrack.org/issues/49/14.html
[+] [-] dagw|4 years ago|reply
Given the number of people, including myself, who consider reading that article a truly formative experiences, you might argue it's one of the most famous/influential articles in programming.
[+] [-] someperson|4 years ago|reply
- Wikipedia
[+] [-] sam345|4 years ago|reply
[+] [-] Ajedi32|4 years ago|reply
[+] [-] bayesian_horse|4 years ago|reply
[+] [-] unknown|4 years ago|reply
[deleted]
[+] [-] unknown|4 years ago|reply
[deleted]
[+] [-] brandonarnold|4 years ago|reply
[+] [-] passwordreset|4 years ago|reply
[+] [-] weld|4 years ago|reply
[+] [-] atatatat|4 years ago|reply
[+] [-] 0x0nyandesu|4 years ago|reply
I'm a millionaire now though so shrug
[+] [-] skhm|4 years ago|reply
Why did we all get caught? Smart enough to figure that out in your teens, dumb enough to think you can get away with it...
In my case I was operating with a dumbass friend who left a "calling card" on one of the compromised machines.
[+] [-] nirv|4 years ago|reply
But as a result of my demonstrative flexing cyber-security activity — I was granted with 'root' credentials on the school's SUSE Linux server… Which apparently at the same time was used as an ISP router for an entire city block.
This granted responsibility, unsurprisingly, turned out to be an extremely effective step to cool my eagerness to hack into all things.
[+] [-] girvo|4 years ago|reply
[+] [-] hbn|4 years ago|reply
[+] [-] vptr|4 years ago|reply
[+] [-] lostlogin|4 years ago|reply
[+] [-] unknown|4 years ago|reply
[deleted]
[+] [-] DeathArrow|4 years ago|reply
[+] [-] isitdopamine|4 years ago|reply
[+] [-] AdrianB1|4 years ago|reply
[+] [-] lvs|4 years ago|reply
[+] [-] Svperstar|4 years ago|reply
[+] [-] weq|4 years ago|reply
[+] [-] poopsmithe|4 years ago|reply
[+] [-] claytongulick|4 years ago|reply
FYI though, it was a password brute force tool that many of us used for various (mostly innocent) myschevios purposes 15-20 years ago.
[+] [-] beermonster|4 years ago|reply
[+] [-] mydeskistoosm|4 years ago|reply
[+] [-] GekkePrutser|4 years ago|reply
Nevertheless, nice of them to open source it.
[+] [-] rhexs|4 years ago|reply
I guess their main claim to fame was being the first “hacker” group to do PR moderately well and transition into decent careers. Not really even an interesting footnote in history.
[+] [-] short12|4 years ago|reply
[+] [-] mike_d|4 years ago|reply
[+] [-] kortilla|4 years ago|reply
> at this point it is more a museum relic than anything practical
[+] [-] zuminator|4 years ago|reply
[+] [-] derwiki|4 years ago|reply
[+] [-] Zenst|4 years ago|reply
[+] [-] dagw|4 years ago|reply
[+] [-] hestefisk|4 years ago|reply
[+] [-] Havoc|4 years ago|reply