Date: Thu, 9 Apr 1998 01:41:58 +0800 (SGT) From: chas <panda@peace.com.my> To: THIERRY.HERBELOT@telspace.alcatel.fr Cc: questions@FreeBSD.ORG Subject: Crack_on_FBSD Message-ID: <3.0.32.19980409020411.00ecf9a8@peace.com.my>
next in thread | raw e-mail | index | archive | help
Thank you for the explanation, Thierry, though I'm still rather confused. I had already checked the archives and found the MD5/DES posts but thought that they dealt with a different problem since the Crack manual mentioned configuration for FreeBSD. Strange to have a port of Crack available at all then, no ? And strange that it still managed to come up with 2 of the passwds. Cheers, chas > You could check it on the mailing llist archive : passwords beginning > with $1$ are crypted with the MD5 library. Crack tries to discover > passwords crypted with the (standard) DES library : it's completely > normal that you can't find back HELLO. > > AFAIK, there is no method to automatically convert your password > database from MD5 crypting to DES crypting (you would need a tool to > automatically discover the source passwords "in the clear" first, and > all crypting methods try hard making such tolls impossible to have - > except if your name is NSA) > > good luck > > TfH > > > > >____________________________ Séparateur Réponse ________________________________ >Objet : Crack on FBSD - how to make it more thorough ? >Auteur : panda@peace.com.my >Date : 08/04/98 17:28 > > >I installed Crack-5.0 using the package (not the port) and >it seems to function, but I'm not sure it's working properly. >I changed the shadmrg script to merge the /etc/passwd and >/etc/master.passwd and ran Crack on the output. > >Crack was finished in less than 10 seconds. >OK, so I only have 100 users on this system but I thought >that this would be still quite an intensive task to run. > >Before this, I'd added a 'dummy' userid with passwd "HELLO" >so that I could check that crack was actually doing >something but strangely, Crack didn't find that (and >I wouldn't have thought "HELLO" was a particularly >intelligent passwd). Fortunately, Crack did discover >2 users with ridiculously easy passwds (since corrected). >so I knew it was doing something. > >Looking at conf/dictrun.conf, I see that nearly all the >rules were employed. Should it really have run so fast ? > >the Reporter also showed the following errors for all user : > >E:0:bad format: output.txt: username:$1$NTG2CU1tFICN2VX20:1029:1006:U >ser &:/home/username:/bin/sh > >I was running Crack on a file output.txt, which was the output >of running scripts/shadmrg.fbsd, based on the supplied shadmrg.sv : > >SHADOW=/etc/master.passwd >PASSWD=/etc/passwd > >( > sed -e 's/^/STAG:/' < $SHADOW > sed -e 's/^/PTAG:/' < $PASSWD >) | >awk -F: ' >BEGIN { > OFS=":"; >$1 == "STAG" { > pw[$2] = $3; > next; >} >$1 == "PTAG"{ > $3 = pw[$2]; > print $0; > >}' | > >I'm afraid I'm not an awk guy so if I just swapped the variable >names at the top. > >Anyway, if there are any other changes that need to be done >to get crack to work perform a more thorough check on FBSD ? > >chas > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-questions" in the body of the message > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-questions" in the body of the message > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.32.19980409020411.00ecf9a8>