Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 May 1999 10:19:38 -0600 (MDT)
From:      Paul Hart <hart@iserver.com>
To:        Dag-Erling Smorgrav <des@flood.ping.uio.no>
Cc:        security@FreeBSD.ORG
Subject:   Re: System beeing cracked!
Message-ID:  <Pine.BSF.3.96.990529101506.23101A-100000@anchovy.orem.iserver.com>
In-Reply-To: <xzpbtf32a5t.fsf@localhost.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On 29 May 1999, Dag-Erling Smorgrav wrote:

> > a) take your master.passwd file and run crack on it yourself and see if it
> > finds the passwords itself.
> 
> I've found John to be far more powerful. It's in the ports.

Yes, I would second that opinion.  John the Ripper understands many of the
non-DES crypt replacements used in various UNIX versions, such as
FreeBSD's MD5 and OpenBSD's Blowfish, and uses hand-optimized assembly
language versions of the hashing algorithms on many target architectures. 

It is probably the best overall password cracker available, in my opinion. 

Paul Hart

--
Paul Robert Hart        ><8>  ><8>  ><8>        Verio Web Hosting, Inc.
hart@iserver.com        ><8>  ><8>  ><8>        http://www.iserver.com/



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.990529101506.23101A-100000>