Boston Hackers Post on Web Site Easy-to-Use Program They Claim Can Steal Windows NT Passwords

And They're Not Done Yet; Hacker Tells CMP's EE Times Online They Aim to 'Blow Microsoft Out of the Water'

PRNewswire
MANHASSET, N.Y.
Apr 16, 1997

A group of Boston-based, sophisticated computer hackers, called the L0pht (pronounced 'loft'), is continuing the assault of Microsoft's (NASDAQ: MSFT) Windows NT operating system. The L0pht has made available for download, via their Web site, red with other publicly available programs, they claim can be used to steal the entire registry of passwords off a Windows NT network, according to CMP Media's EE Times Online (http://www.eet.com/).

"If you have an NT network, and you have that network connected to the Internet, you're in deep trouble," "Mudge," co-author of the program -- L0phtcrack -- and an encryption expert, told EE Times Online.

Microsoft officials contacted by EE Times Online last week said they were not familiar enough with L0phtcrack to comment specifically a more serious threat to Microsoft's flagship network operating system than other 'hacks' that have come to light in recent weeks because it employs a spreadsheet-like interface that is far easier to use.

"It (L0phtcrack) sets up columns of the user lists, what their passwords are...and when you click 'Run,' it just starts screaming down (decrypting) all the [network's] passwords. And then you can save that file out to a disk or print it," said Mudge.

While L0phtcrack, like other hacks before it, requires that a user have network-administrator privileges to access an NT network's password-encryption file, hackers note that common workarounds already exist if you know where to find them.

However, that could change soon, EE Times Online reports, as a worldwide network of hackers who communicate via the Internet prepare an all-out assault on Windows NT. L0pht has warned publicly that a second version of its program, due to be available within a few weeks, promises even easier access to the NT-password file from remote locations, including over the Internet, without it being necessary for a user to have network-administrator privileges.

"The next version (of L0phtcrack) is going to blow Microsoft out of the water," said Mudge. He said L0pht hopes to supply Microsoft with at least a week's "lead time" to react via a "fix" or a "patch."

"They (L0pht) make a claim here," said Mike Nash, Microsoft Director of Marketing for Windows NT Server, "but the claim that you can basically get (administrator privileges) without knowing the admin password is a pretty significant claim that's unsubstantiated."

"We're doing this because Microsoft is shoving stuff down people's throats, and you don't have the ability to look and see how good it is," said Mudge. "They're saying, 'Trust us; it's secure.'"

For its part, Microsoft officials insist that if network administrators and users pay adequate attention to security issues, cracking an NT network remains inherently difficult. Microsoft also noted that most, if not all, operating systems have been subject to similar types of attack.

EE Times Online is the Web arm of CMP Media Inc.'s EE Times. EE Times delivers news of both business and technology to engineers and technical/corporate managers at electronics and computer systems manufacturers in the United States.

CMP Media Inc. provides publishing, marketing and information services to the broad high-technology spectrum -- the builders, sellers and users of technology -- through print and electronic media. All of CMP's publications and online products can be accessed through the company's TechWeb® site on the World Wide Web (http://www.techweb.com/). Print titles include EE Times, Computer Reseller News, InformationWeek and WINDOWS Magazine.

-0- 04/16/97

SOURCE: CMP Media Inc.

CONTACT: Steve Rubel, 516-562-7434 or srubel@cmp.com, or Catherine
Jarrat Koatz, 516-562-7827 or ckoatz@cmp.com, both of CMP Corporate
Communications