From owner-freebsd-security Tue Sep 19 19:07:40 1995 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id TAA11705 for security-outgoing; Tue, 19 Sep 1995 19:07:40 -0700 Received: from s4.elec.uq.edu.au (clary@s4.elec.uq.edu.au [130.102.96.4]) by freefall.freebsd.org (8.6.12/8.6.6) with ESMTP id TAA11697 for ; Tue, 19 Sep 1995 19:07:09 -0700 Received: (from clary@localhost) by s4.elec.uq.edu.au (8.6.12/8.6.12) id MAA09083 for freebsd-security@freebsd.org; Wed, 20 Sep 1995 12:04:48 +1000 From: Clary Harridge Message-Id: <199509200204.MAA09083@s4.elec.uq.edu.au> Subject: crack for freebsd To: freebsd-security@freebsd.org Date: Wed, 20 Sep 1995 12:04:47 +1000 (EST) X-Mailer: ELM [version 2.4 PL24] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Content-Length: 392 Sender: owner-security@freebsd.org Precedence: bulk Hi can someone please tell me -- Is there a version of crack somewhere which knows how to handle the current FreeBSD encryption algorithms. I would like to be able to check for dumb user passwords. -- regards Dept. of Electrical Engineering, Clary Harridge University of Queensland, QLD, Australia, 4072 Phone: +61-7-365-3636 Fax: +61-7-365-4999 INTERNET: clary@elec.uq.edu.au