Date: Sat, 29 May 1999 10:19:38 -0600 (MDT) From: Paul Hart <hart@iserver.com> To: Dag-Erling Smorgrav <des@flood.ping.uio.no> Cc: security@FreeBSD.ORG Subject: Re: System beeing cracked! Message-ID: <Pine.BSF.3.96.990529101506.23101A-100000@anchovy.orem.iserver.com> In-Reply-To: <xzpbtf32a5t.fsf@localhost.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On 29 May 1999, Dag-Erling Smorgrav wrote: > > a) take your master.passwd file and run crack on it yourself and see if it > > finds the passwords itself. > > I've found John to be far more powerful. It's in the ports. Yes, I would second that opinion. John the Ripper understands many of the non-DES crypt replacements used in various UNIX versions, such as FreeBSD's MD5 and OpenBSD's Blowfish, and uses hand-optimized assembly language versions of the hashing algorithms on many target architectures. It is probably the best overall password cracker available, in my opinion. Paul Hart -- Paul Robert Hart ><8> ><8> ><8> Verio Web Hosting, Inc. hart@iserver.com ><8> ><8> ><8> http://www.iserver.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.990529101506.23101A-100000>