▄
· ██▄
: █▄ ▄▄█▀▀▀████▄ ▄▄▄▄▄▄▄▄▄ ▄ ▄▄▄▄▄
···──│·┐ ███▄ ▄████ ░ █▓▓▓█ █████ ██ ▄██ ░ █████
··--───-·█████·──════--·█▓▓▓█·░·█▒▒▒█··█▓███·░·▐██▄·-─-·▄████·░░·█████·-─··
··─┘ █▓███ ░ █▒▒▒█ ░ █▓▓▓█ █▓▓██ ░ ████ █▓███ ░░ █▓███
│ ▄ █▓▓▓█ ▄ █░░░█ ░ ▀███ █▓▓▓█ ░░ █▓▓█ ░ █▓▓▓█ ░░ █▓▓▓█
│ ██▄█▒▓▓█▄██ █▒▒▒█ ░ ▀█ █▒▓▓█ ░░ █▒▒█ ░ █▒▓▓█ ░░ █▒▓▓█
│ ██▀█▒▒▒█▀██ █▓▓▓█▄▄▄▄▄ █▒▒▒█ ░░ █▓▓█ ░ █▒▒▒█ ░ █▒▒▒█
| ▀ █░░░█ ▀ ████████████▄ █░░░█ ░░ ████ ░ █░░░█ ▄ █░░░█
: █ █ ▀▀██████▓▓▓█ █ █ ░░ ██▀ ░░ █ █ ██ █ █
: █░░░█ ▄ █▒▒▒█ █░░░█ ▄▄▄█▀ ░░ █░░░█ ▀ █░░░█
. █▒▒▒█ ░ ▄█ ██▄ ░ █░░░█ █▒▒▒█ ██▄ ░░ █▒▒▒█ ░ █▒▒▒█
. █▓▓▒█ ░ ▄███ ████▄ ░ █▒▒▒█ █▓▓▓█ ░░ ████ ░ █▓▓▓█ ░░ █▓▓▓█
· █▓▓▓█ ░ █▓▓▓█ █▓▓▓█ ░ █▓▓▓█ █▓▓▓█ ░░ █▓▓▓█ ░ █▓▓▓█ ░░ █▓▓▓█
··─────·███▓█·░·█▒▒▒█··█▒▒▒█·░·█████··█▓███·░░·█▒▒▒█·░·█▓███·░░·█▓███·──··
· ████ ░ █▓▓▓█ █▓▓▓█ ░ ████▀ ███▀ ░ █▓▓▓█ ░ █████ ░ ███▀
· ▀▀█▄▄▄████▀ ▀████▄▄▄█▀▀ █▀ █████ █████ █▀
▀██ ▀███
▀ ▀█
▄┌█───────────────────────────────────────────────────────────┐▄
─ ── : ..:: | :::.. ..:::RELEASE.iNF0:::.. ..::: | ::.. : ── ─
│░░░░└───────────────────────────────────────────────────────────█┘░░░░│
┌─│───────────┘ └───────────│─┐
│█: :█│
│█ Target: [ @stake LophtCrack 4.0 ] █│
│█ URL: [ http://www.atstake.com/research/lc/ ] █│
│█ █│
│█ Cracker: [ B-$hep ] █│
│█ Crack Type: [ Keygen ] █│
│█ █│
│█ Release Date: [ 29-06-2002 ] █│
│█ Release Name: [ tsrh-astlc40_kg.zip ] █│
│█ █│
│█: :█│
└─│──────────────────────────────────────────────────────────────────────│─┘
│ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │
┌ ─ ── ────────────────────────────────────────────────────────────── ── ─ ┐
││ [Target.Description] ││
││ ─ ── ─── ────── ·:
└─--··
Passwords have received increasing attention as a source of
vulnerability in individual machines and entire networks. Security
experts from industry, government, and academia agree that weak
passwords represent one of the ten most critical internet security
threats.* LC4 offers an easy-to-use and adaptable way to identify and
assess password vulnerability.
LC4 uses a variety of sources and methods to retrieve passwords from
the operating system. It provides feedback about the strength of
passwords based on the types of audit required to recover the
password and the length of time required to do so. The end result is
a state of the art tool for password auditing and recovery that
serves to guide organizational policies and procedures.
There are many uses for auditing user passwords. First and foremost
is for a system administrator to audit the strength of the passwords
their users are using. Weak passwords represent vulnerability points
for any organization, and uncovering these vulnerabilities is the
first step toward reducing them. Administrators can use corporate
password policies, and for some environments, filtered password
generators to improve the quality of passwords used in their
organizations. But without testing the passwords chosen by users or
generated against a real world password auditor, the administrator is
taking a chance at the amount of time required for an external
attacker or malicious insider to uncover the passwords.
In other cases LC4 can be used to streamline the migration or
upgrading of users from one authentication system to another. Lastly,
LC4 can serve to recover a lost or forgotten password to permit
re-entry to a system from which an administrator is locked out.
└┐ ┌┘
││ [Register.Notes] ││
└┐ ─ ── ─── ────── ┌┘
...Use tsrh-astlc40_kg.exe for generate valis Unlock Code...
┌┘ └┐
││ ││
└ ─ ── ────────────────────────────────────────────────────────────── ── ─ ┘
│ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │
: ┌────────────────────────────────────────────────────────────┐ :
└ ── : .. GREETS FLY OUT TO .. : ── ┘
│░░░░└────────────────────────────────────────────────────────────┘░░░░│
┌─│───────────┘ └───────────│─┐
│█ █│
│█ lash, evc, rp2k, desperate, evidence, inferno, tnt █│
│█ and other public activity groups in a scene. █│
│█: :█│
└─│──────────────────────────────────────────────────────────────────────│─┘
│ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │
: ▄┌────────────────────────────────────────────────────────────┐▄ :
└ ── : ..:: | :::.. ..:::THe Last ANTiHEROES:::.. ..::: | ::.. : ── ┘
│░░░░└────────────────────────────────────────────────────────────┘░░░░│
┌─│───────────┘ └───────────│─┐
│█: This is our social protest to all rotting from violence and fear to :█│
│█ the world. By all assholes, making money on trust. To all political █│
│█ rats thirsting, To cut off from a part. Everyone, who divides of the █│
│█ people in classes and levels, as a puff pie. To all dictators and █│
│█ other pseudo-owners of the world, dreaming to use human Freedom, █│
│█ placing them some restrictions, structure and trajectory of █│
│█ behaviour to itself somewhere. Who tries to make all man by a part █│
│█ of a not conscious working material. Everyone, who wants to stop us. █│
│█ Everyone, who wants to establish the order in the world. We for █│
│█ inviolability of human freedom. We for the clean world. We for clean █│
│█ consciousness. We for infinity of the world, for freedom, dream also █│
│█ hope for a spirit of clean air, which will give us force on █│
│█ struggle. The rotten people. The black sky. The lifeless feeling of █│
│█ the approach untied among themselves tests. Madness to be, that, █│
│█ whom you - not, also delirium. It is impossible, is in two modular █│
│█ conditions in one and too instant. To think of it already - █│
│█ emergency phenomenon. The phenomenon of empty, dead life. Life of █│
│█ other time. Other founder and it are natural other relation. We any █│
│█ more do not trust legality. In the promises. We any more do not █│
│█ search for the heroes, and we do not wait last indicator, after █│
│█ thermonuclear of explosion. We do not trust education those who █│
│█ already on the dark party, on the party those who wants to make the █│
│█ world on own similarity. We do not wish to replace other cheek, when █│
│█ already all man is at Stages of destruction. Light - is close, when █│
│█ knows a way to self-destruction. The explosion of all molecules will █│
│█ result in regeneration of Life on a ground. █│
│█: ┌───────────────────[E.N.D.]───────────────────┐ :█│
└─│───────────┴──────────────────────────────────────────────┴───────────│─┘
. │ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │ .
└─────────────│──────────────────────────────────────────────│─────────────┘
│ [TSRh.Members] │
│ ──────┐┌────── │
┌─│───────────┘ ││ └───────────│─┐
│█: └┐ :█│
│█: [ B-$hep ] ............. └┐ [ founder, cracker ] :█│
│█: [ OxEn ] ............. └┐ [ founder, cracker ] :█│
│█: [ Nitrogen ] ............. └┐ [ cracker, coder ] :█│
│█: [ EGOiST ] ............. └┐ [ cracker ] :█│
│█: [ aZZaZZeLLo ] ............. └┐ [ cracker, design ] :█│
│█: [ Fox ] ............. └┐ [ cracker, design ] :█│
│█: [ ByTESCRK ] ............. └┐ [ cracker ] :█│
│█: [ QIce ] ............. └┐ [ cracker, coder ] :█│
│█: [ Koba Yashi ] ............. └┐ [ cracker ] :█│
│█: [ Real|sty ] ............. └┐ [ cracker ] :█│
│█: [ Nemizis ] ............. └┐ [ cracker ] :█│
│█: [ dexim ] ............. └┐ [ cracker, trial member ] :█│
│█: ││ :█│
└─│──────────────────────────────────────────────────────────────────────│─┘
| · .o0o. CONTACTS .o0o. · |
└─┼·· ··┼─┘
│ [ WEB Site ] ............. ││ [http://www.kickme.to/tsrh ] │
| [ E-mail ] ............. └┐ [[email protected] ] |
: [ IRC ] ............. ││ [EFNET, #tsrh ] :
· ──────────────────────────────┘└────────────────────────────── ·
· nfo.last.updated ·
· may.27.2002 ·