An buɗe lambar tushe na shirin duba kalmar sirri L0phtCrack

An buga rubutun tushen kayan aikin L0phtCrack, an ƙera su don dawo da kalmomin shiga ta amfani da hashes, gami da amfani da GPU don hanzarta hasashen kalmar sirri. An buɗe lambar a ƙarƙashin lasisin MIT da Apache 2.0. Bugu da ƙari, an buga plugins don amfani da John the Ripper da hashcat azaman injuna don tantance kalmomin shiga a cikin L0phtCrack.

An fara da fitowar L0phtCrack 7.2.0 da aka buga jiya, za a haɓaka samfurin azaman buɗe aikin kuma tare da sa hannun al'umma. An maye gurbin haɗin kai zuwa ɗakunan karatu na sirri ta hanyar amfani da OpenSSL da LibSSH2. Daga cikin tsare-tsaren don ci gaba da haɓaka L0phtCrack, an ambaci jigilar lambar zuwa Linux da macOS (da farko kawai dandamalin Windows ne ke tallafawa). An lura cewa jigilar kaya ba zai yi wahala ba, tun da an rubuta abin dubawa ta amfani da ɗakin karatu na dandalin Qt.

An samar da samfurin tun 1997 kuma an sayar da shi ga Symantec a 2004, amma an sake sayo shi a cikin 2006 ta uku wadanda suka kafa aikin. A cikin 2020, Terahash ya mamaye aikin, amma a cikin Yuli na wannan shekara an mayar da haƙƙin lambar ga mawallafa na asali saboda gazawar cika wajibai a ƙarƙashin yarjejeniyar. Sakamakon haka, waɗanda suka ƙirƙira L0phtCrack sun yanke shawarar ƙin samar da kayan aikin a cikin nau'in samfuran mallakar mallaka kuma buɗe lambar tushe.

source: budenet.ru

Add a comment