lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: mmo at remote-exploit.org (mmo@...ote-exploit.org)
Subject: Cisco LEAP exploit tool...

Hi all
---Asleap and developed
> by Beyond-Security, actively de-authenticates users, sniffs the network
> when the user re-auntheticates, and performs an offline dictionary
> attack upon the password."
>

First of all it is not developed by Beyond-Security.


> ---
>
> Are theyt talking about the Radius / AAA password? WEP?
>

LEAP is a Lightweight Extensible Authentication Protocol from CISCO.
It uses challange response, like mschap. Got the same bugs, nothing to
do with Radius or WEP. Get the details on sourceforge.


> How long is that effective in LEap. I understand it does the frequency 
> hop
> like the milatary radios and uses an X-Auth backend...
>

Forget the 802.11b/g does not use frequency hopping. The amount of time 
to crack is only
a few seconds, the major time factor is having the right wordlist to 
prehash from. If you dont
have the password in your list, only bruteforce can help you, so then 
it depends on the complexity and the length.


> How long will it take to crack the password? I know that I locked 
> myself out
> of a windows box once- booted with knoppix and burnt the Sam --
>
> Ok know just run l0phtcrack and i had the password right?
>

Nothing to do with SAM etc, because it sniffs challange and response 
and then offline crack it.


Powered by blists - more mailing lists