[EMAIL PROTECTED] (John Hascall) writes:

>    This is why good password choice is *critical*.  If my password
>    is "hello" then I will be cracked by this process in short
>    order.  If my password is "Op+f@1btsIstd" it is extremely unlikely
>    this is one of the keys they have to try so I am safe.

is there a "crack" module for kerberos?  after reading the stanford paper
about how kerberos tickets could be attacked offline, i've been wanting to
actually try this -- no sniffing is required -- against my own kerberos db
to look for easy to guess passwords.  probably distributed.net should run
this as a contest or something.  but is there a kit available or would i
have to be a black hat to get my hands on software like that?
-- 
Paul Vixie
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
http://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to