L0pht

L0pht Heavy Industries

LHI Logo
Formation 1992
Extinction 2000
Purpose Hacker think tank
Location
  • United States
Origin
Boston, Massachusetts
Founders
Count Zero
White Knight
Brian Oblivion
Golgo 13
Products
L0phtCrack
Affiliations CULT OF THE DEAD COW
Website Main Site

L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US.

Name

The second character in its name was originally a slashed zero, a symbol used by old teletypewriters and some character mode operating systems to mean zero. Its modern online name, including its domain name, is therefore "l0pht" (with a zero, not a letter O or Ø).

The origin of the name may be traced to the fact that Brian Oblivion and Count Zero, two of the founding members of L0pht shared a common loft space in Boston with their wives, who ran a hat business on the other side. There they experimented with their own personal computers, equipment purchased from the Flea[1] at MIT, and items obtained from dumpster diving local places of interest.[2]

History

L0pht was founded in 1992 in the Boston area as a location for its members to store their computer hardware and work on various projects.[3] In time, the members of L0pht quit their day jobs to start a business venture named L0pht Heavy Industries, a hacker think tank. The business released several security advisories and produced widely used software tools such as L0phtCrack, a password cracker for Windows NT. On May 19, 1998, all seven members of L0pht (Brian Oblivion, Kingpin, Mudge, Space Rogue, Stefan Von Neumann, John Tan, Weld Pond) famously testified before the Congress of the United States that they could shut down the entire Internet in 30 minutes.[4] The Washington Post referred to the response as "a tragedy of missed opportunity".[5]

In October 1999 L0pht was featured in a lengthy article in the New York Times Sunday Magazine.[6] In the article Jeffrey Hunker, NSC's then Director of Information Protection, raved about L0pht, "Their objective is basically to help improve the state of the art in security and to be a gadfly, so to speak."

In January 2000, L0pht Heavy Industries merged with the startup @stake, completing the L0pht's slow transition from an underground organization into a "whitehat" computer security company.[7] Symantec announced its acquisition of @stake on September 16, 2004, and completed the transaction on October 8 of that year.[8]

On March 14, 2008, several members of L0pht sat at a panel at a standing-room-only group of infosec professionals at SOURCE:Boston. Present were Weld Pond, John Tan, Mudge, Space Rogue, Silicosis and Dildog.[9]

Products

As L0pht occupied a physical space, it had real expenses such as electricity, phone, Internet access, and rent. Early in the L0pht's history these costs were evenly divided among L0pht members. In fact, L0pht originally shared a space with a hat-making business run by the spouses of Brian Oblivion and Count Zero, and the rental cost was divided between these. This was soon subsidized by profits made from selling old hardware at the monthly MIT electronic flea market during the summer.[10]

Occasionally, shell accounts were offered for low cost on the L0pht.com server to selected individuals; while these individuals had access to the L0pht.com server they were not members of L0pht. One of the first physical products sold for profit by L0pht was a POCSAG decoder kit, which was sold in both kit and assembled form. Subsequently, the Whacked Mac Archives were transferred to CD-ROM for sale, soon followed by CD copies of the Black Crawling System Archives. The command line version of L0phtCrack, the password cracker for Windows NT, was given away free, but the GUI version was sold as a commercial product. This was followed by the creation of the Hacker News Network website to host advertisements. However, even with these sources of income, L0pht barely broke even, and eventually began doing custom security coding for companies like NFR.[11][12]

In January 2009, L0phtCrack was acquired by the original authors Zatko, Wysopal, and Rioux from Symantec. L0phtCrack 6 was released at the SOURCE Boston Conference on March 11, 2009. L0phtCrack 6 contains support for 64-bit Windows platforms as well as upgraded rainbow tables support.

Members

L0pht membership varied but included at various times:[13]

References

  1. The Flea at MIT | The MIT Radio Society
  2. Smolan, Rick; Erwitt, Jennifer (1996). L0pht dumpster diving cited in 24 Hours in Cyberspace by Rick Smolan and Jennifer Erwitt. QUE Macmillan. ISBN 978-0-7897-0925-7. Retrieved 2008-12-12.
  3. "Online NewsHour: L0pht on Hackers". 1998-05-08. Archived from the original on 2000-03-11.
  4. "Weak Computer Security in the Government: Is the Public at Risk?". 1998-05-19. Archived from the original on 2011-07-21.
  5. "A disaster foretold — and ignored". Washington Post. 22 Jun 2015.
  6. Bruce Gottlieb (1999-10-03). "HacK, CouNterHaCk". The New York Times.
  7. "Odd coupling links hackers with security firm". 2000-01-07. Archived from the original on 2004-11-16.
  8. "Symantec Completes @stake Acquisition". 2004-10-08. Archived from the original on 2004-10-09.
  9. "SOURCE:Boston L0pht Panel on the SOURCE:Boston blog". Retrieved 2008-03-14.
  10. "Brian Oblivion on "function and direction of the L0pht" in 1998". Archived from the original on 1998-02-05. Retrieved 2008-12-12.
  11. "NFR and L0pht to Deliver Improved IDS". InfoSecNews.org. Archived from the original on 2007-05-10.
  12. Fitzgerald, Michael (2007-04-17). "L0pht in Transition". CSO.
  13. "L0pht Heavy Industries Home Page". Retrieved 2008-04-20.
  14. "Space Rogue from L0pht and Hacker News Network Joins Tenable Network Security". Retrieved 2014-01-07.
  15. "Internet Archive Wayback Machine saved copy of Stefan's L0pht Heavy Industries Home Page". Archived from the original on 1999-02-20. Retrieved 2008-12-12.
  16. "Cyber UL Could Become Reality Under Leadership of Hacker Mudge". Retrieved 2015-11-20.

External links

This article is issued from Wikipedia - version of the Wednesday, May 04, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.