Ports with duplicate LATEST_LINKS
Cy Schubert
Cy.Schubert at komquats.com
Tue Feb 17 12:15:46 PST 2004
In message <6.0.1.1.2.20040217204419.01e2a170 at 213.30.158.180>, Laurent
LEVIER w
rites:
> Hi Gentlemen,
>
> It is really a brute force attack tool to obtain passwords.
> A password cracker (as Crack, John the Ripper, ...) but oriented to work
> over the network.
>
> Hydra does password cracking against SMB (Windows), telnet, POP/IMAP, FTP, ..
> .
> It does dictionnary attacks as simple password generation algorithms.
>
> I use that in my company to evaluate passwords quality when I am not
> granted to crack the passwords directly from the box.
> If I succeed, bad point for the box owner ;-)
Should I commit the following patch to correct the wording?
Index: Makefile
===================================================================
RCS file: /home/pcvs/ports/security/hydra/Makefile,v
retrieving revision 1.6
diff -u -r1.6 Makefile
--- Makefile 15 Feb 2004 00:26:41 -0000 1.6
+++ Makefile 17 Feb 2004 20:13:27 -0000
@@ -15,7 +15,7 @@
MASTER_SITE_SUBDIR= groups/thc
MAINTAINER= llevier at argosnet.com
-COMMENT= Bruce Force Attack Utility working on multiple network services
+COMMENT= Brute force attack utility working on multiple network services
NO_LATEST_LINK= yes
PLIST_FILES= bin/hydra
--
Regards, Phone: (250)387-8437
Cy Schubert Fax: (250)387-5231
Team Leader, Solaris Team Email: Cy.Schubert at osg.gov.bc.ca
Open Systems Group, CITS
Ministry of Management Services
Province of BC
FreeBSD UNIX: cy at FreeBSD.org
More information about the freebsd-ports
mailing list