From owner-freebsd-questions Mon Feb 19 01:51:26 1996 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id BAA15675 for questions-outgoing; Mon, 19 Feb 1996 01:51:26 -0800 (PST) Received: from genesis.atrad.adelaide.edu.au (genesis.atrad.adelaide.edu.au [129.127.96.120]) by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id BAA15663 for ; Mon, 19 Feb 1996 01:51:19 -0800 (PST) Received: from msmith@localhost by genesis.atrad.adelaide.edu.au (8.6.12/8.6.9) id UAA00526; Mon, 19 Feb 1996 20:12:31 +1030 From: Michael Smith Message-Id: <199602190942.UAA00526@genesis.atrad.adelaide.edu.au> Subject: Re: Crack freeBSD password file To: Lars_Koeller@odie.physik2.uni-rostock.de (Lars Koeller) Date: Mon, 19 Feb 1996 20:12:31 +1030 (CST) Cc: msmith@atrad.adelaide.edu.au, freebsd-questions@freefall.freebsd.org In-Reply-To: <199602190806.JAA20080@odie.physik2.uni-rostock.de> from "Lars Koeller" at Feb 19, 96 09:06:02 am MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-questions@FreeBSD.ORG Precedence: bulk Lars Koeller stands accused of saying: > > > > You will have to modify the 'crack' program to understand the longer MD5 > > encrypted passwords that FreeBSD uses. I would expect that this should be > > a relatively straightforward task, but I'm not familiar with 'crack'. > > > > Anyone else done this already and can supply Andre' with the diffs? > > How do you want to crack a password you can't read? FreeBSD uses > shadow passwords only root can read! The idea is not to crack passwords, but to find stupid ones that would be vulnerable to a casual attack. > Lars -- ]] Mike Smith, Software Engineer msmith@atrad.adelaide.edu.au [[ ]] Genesis Software genesis@atrad.adelaide.edu.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control (ph/fax) +61-8-267-3039 [[ ]] Collector of old Unix hardware. "I seek PEZ!" - The Tick [[