Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
L0phtCrack
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Windows password cracker}} {{Infobox software | name = L0phtCrack | developer = Peiter Zatko ([[Peiter Zatko|Mudge]]), Chris Wysopal ([[Weld Pond]]), Christien Rioux ([[DilDog]]), Rob Cheyne, Ian Melven | operating_system = [[Microsoft Windows]] | latest_release_version = {{wikidata|property|reference|P348}} | genre = [[password cracking|Password Cracking]], [[Information technology security audit|Operating System Audit]] | license = A combination of multiple [[open source]] licenses<ref>{{cite web |url=https://gitlab.com/l0phtcrack/l0phtcrack/-/blob/25f681c07828e5e68e0dd788d84cc13c154aed3d/tools/releasetool/installer/license.txt |title=tools/releasetool/installer/license.txt |date=2021-10-16 |access-date=2024-05-11 |archive-date=2023-06-13 |archive-url=https://web.archive.org/web/20230613222621/https://gitlab.com/l0phtcrack/l0phtcrack/-/blob/25f681c07828e5e68e0dd788d84cc13c154aed3d/tools/releasetool/installer/license.txt |url-status=live }}</ref> | website = [https://www.l0phtcrack.com/ l0phtcrack] }} '''L0phtCrack''' is a [[password]] [[audit]]ing and [[password cracking|recovery]] application originally produced by [[Peiter Zatko|Mudge]] from [[l0pht|L0pht Heavy Industries]]. It is used to test [[password strength]] and sometimes to recover lost [[Microsoft Windows]] passwords, by using [[dictionary attack|dictionary]], [[brute force attack|brute-force]], hybrid attacks, and [[rainbow tables]].<ref name=sectools>{{cite web |url=https://sectools.org/tool/l0phtcrack/ |title=L0phtCrack |website=sectools.org |access-date=2024-05-11 |archive-date=2024-05-11 |archive-url=https://web.archive.org/web/20240511152123/https://sectools.org/tool/l0phtcrack/ |url-status=live }}</ref> The initial version was released in the Spring of 1997.<ref>{{cite news |url=http://pubs.cmpnet.com:80/eet/news/97/950news/hackers.html |archive-url=https://web.archive.org/web/19981205132055/http://pubs.cmpnet.com/eet/news/97/950news/hackers.html |url-status=dead |archive-date=1998-12-05 |title=Hackers keep the heat on Windows NT security |last=Lange |first=Larry |publisher=eeTimes |date=1997-04-15 |access-date=2024-05-11}}</ref> The application was produced by [[@stake]] after the L0pht merged with @stake in 2000. @stake was then acquired by [[NortonLifeLock|Symantec]] in 2004.<ref>{{cite news |url=https://www.eweek.com/security/symantec-buys-security-consulting-pioneer-stake/ |title=Symantec Buys Security Consulting Pioneer @stake |last=Fisher |first=Dennis |publisher=eWeek |date=2004-09-16 |access-date=2024-05-11 |archive-date=2024-05-24 |archive-url=https://web.archive.org/web/20240524052509/https://www.eweek.com/security/symantec-buys-security-consulting-pioneer-stake/ |url-status=live }}</ref> Symantec later stopped selling this tool to new customers, citing [[export of cryptography in the United States|US Government export regulations]], and discontinued support in December 2006.<ref name=sectools /><ref name=pullsplug>{{cite news |url=https://www.eweek.com/security/symantec-pulls-plug-on-l0phtcrack/ |title=Symantec Pulls Plug on L0phtCrack |date=2006-03-08 |last=Naraine |first=Ryan |publisher=eWeek |access-date=2024-05-11 |archive-date=2024-05-24 |archive-url=https://web.archive.org/web/20240524052509/https://www.eweek.com/security/symantec-pulls-plug-on-l0phtcrack/ |url-status=live }}</ref> In January 2009, L0phtCrack was acquired by the original authors [[Peiter Zatko|Zatko]], [[Chris Wysopal|Wysopal]], and Rioux from Symantec. L0phtCrack 6 was announced on 11 March 2009 at the SOURCE Boston Conference.<ref name="ver6-announcement">{{cite news |url=https://www.infosecurity-magazine.com/news/new-version-of-l0phtcrack-to-be-unveiled-next-week/ |title=New version of L0phtcrack to be unveiled next week |work=Infosecurity Magazine |date=2009-03-03 |access-date=2024-05-11 |archive-date=2024-05-11 |archive-url=https://web.archive.org/web/20240511152122/https://www.infosecurity-magazine.com/news/new-version-of-l0phtcrack-to-be-unveiled-next-week/ |url-status=live }}</ref> L0phtCrack 6 contains support for 64-bit Windows platforms as well as upgraded rainbow tables support.<ref name="rises-from-ashes">{{cite news |url=https://www.theregister.co.uk/2009/05/27/l0phtcrack_returns/ |title=Seminal password tool rises from Symantec ashes |last=Goodin |first=Dan |date=2009-05-27 |work=[[The Register]] |access-date=2024-05-11 |archive-date=2019-12-10 |archive-url=https://web.archive.org/web/20191210010509/https://www.theregister.co.uk/2009/05/27/l0phtcrack_returns/ |url-status=live }}</ref> L0phtCrack 7 was released on 30 August 2016, seven years after the previous release.<ref>{{cite news |url=https://www.scmagazineuk.com/new-version-of-l0phtcrack-makes-cracking-windows-passwords-easier-than-ever/article/530687/ |title=New version of L0phtCrack makes cracking Windows passwords easier than ever |last=Millman |first=Rene |date=2016-09-01 |work=SC Magazine UK |url-status=dead |archive-url=https://web.archive.org/web/20170608230628/https://www.scmagazineuk.com/new-version-of-l0phtcrack-makes-cracking-windows-passwords-easier-than-ever/article/530687/ |archive-date=2017-06-08}}</ref> L0phtCrack 7 supports GPU cracking, increasing performance up to 500 times that of previous versions.<ref name="L0phtCrack 7 Shows Windows Passwords Easier to Crack Now Than 20 Years Ago">{{cite news |url=https://www.onthewire.io/l0phtcrack-7-shows-windows-passwords-easier-to-crack-now-than-20-years-ago/ |title=L0phtCrack 7 Shows Windows Passwords Easier to Crack Now Than 20 Years Ago |last=Fisher |first=Dennis |date=2016-08-30 |work=[[onthewire]] |access-date=2024-05-11 |archive-date=2017-08-10 |archive-url=https://web.archive.org/web/20170810132215/https://www.onthewire.io/l0phtcrack-7-shows-windows-passwords-easier-to-crack-now-than-20-years-ago/ |url-status=dead }}</ref> On April 21, 2020, Terahash<ref name="terahash">{{cite web |url=https://www.terahash.com/news/terahash-acquires-l0phtcrack.htm |archive-url=https://web.archive.org/web/20200421191549/https://terahash.com/news/terahash-acquires-l0phtcrack.htm |archive-date=2020-04-21 |title=Terahash Acquires L0phtCrack |url-status=dead |access-date=2024-05-11}}</ref> announced it had acquired L0phtCrack. Details of the sale were not released. On July 1, 2021 L0pht Holdings, LLC repossessed L0phtCrack after Terahash defaulted on its instalment sale loan. The current owners announced that they were exploring open source options for L0phtcrack. Due to commercial libraries existing within the software this may take some time.<ref name="repossessed">{{cite web |url=https://l0phtcrack.gitlab.io |archive-url=https://web.archive.org/web/20210923170826/https://l0phtcrack.gitlab.io/ |archive-date=2021-09-23 |title=Changes for L0phtCrack |date=2021-07-26}}</ref> On October 17, 2021 L0phtCrack version 7.2.0 was released open-source, with different portions of the software being published under different licenses.<ref>{{cite web |url=https://gitlab.com/l0phtcrack/l0phtcrack/-/commit/25f681c07828e5e68e0dd788d84cc13c154aed3d |title=update license and credits (25f681c0) |date=2021-10-17 |first=Christien |last=Rioux |access-date=2024-05-11 |archive-date=2023-02-20 |archive-url=https://web.archive.org/web/20230220205221/https://gitlab.com/l0phtcrack/l0phtcrack/-/commit/25f681c07828e5e68e0dd788d84cc13c154aed3d |url-status=live }}</ref><ref name="OSS">{{cite news |url=https://www.securityweek.com/password-auditing-tool-l0phtcrack-released-open-source |archive-url=https://web.archive.org/web/20211019171506/https://www.securityweek.com/password-auditing-tool-l0phtcrack-released-open-source |archive-date=2021-10-19 |title=Password Auditing Tool L0phtCrack Released as Open Source |publisher=SecurityWeek.com |date=2021-10-18 |first=Eduard |last=Kovacs |access-date=2024-05-11}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)