lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: mmo at remote-exploit.org (_MAX_)
Subject: corrected statement / question LEAP/Radius

Ehmm.. maybe i asked the wrong way around.

I know the leap dictionary attack problem, and also know the anwrapper code.

I'm more interressted in "how was ist deployed in the real world" and
"what was is look like in the pen-test scenario" (Timeing etc)
Personally i dont see that NT-Account lockout is activated, when
barcodescanning is used, because no one wants that the scanners don't work
anymore in the warehouses.
Are there automated tools for the Radius part? I can handle a sniffer,
but maybe there is an easier way, that i dont know.

I don't want a guide what you are doing, more like what it os really look
like.
Greetings

Max




Powered by blists - more mailing lists