Date: Mon, 19 Feb 1996 09:06:02 +0100 From: Lars Koeller <Lars_Koeller@odie.physik2.uni-rostock.de> To: msmith@atrad.adelaide.edu.au Cc: freebsd-questions@freefall.FreeBSD.org Subject: Re: Crack freeBSD password file Message-ID: <199602190806.JAA20080@odie.physik2.uni-rostock.de> In-Reply-To: Mail from 'Michael Smith <msmith@atrad.adelaide.edu.au>' dated: Mon, 19 Feb 1996 12:46:09 %2B1030 (CST)
next in thread | previous in thread | raw e-mail | index | archive | help
Hi!
> Andre' Carvalho stands accused of saying:
> >
> > I would like to know if I can use a program like "crack" to try to break =
> > my users' passwords. This is very important because I do not want to =
> > have security holes in this machine.
> >
> > I tried a lot, but it says that the crypt() function is not standard and =
> > that the encrypted passwords are too long.
>
> You will have to modify the 'crack' program to understand the longer MD5
> encrypted passwords that FreeBSD uses. I would expect that this should be
> a relatively straightforward task, but I'm not familiar with 'crack'.
>
> Anyone else done this already and can supply Andre' with the diffs?
How do you want to crack a password you can't read? FreeBSD uses
shadow passwords only root can read!
Regards
Lars
--
____________________________________________________________________________
Lars Köller Phone: +49 381/498-1665, Fax: -1667
Universität Rostock (Germany) E-Mail:
Fachbereich Physik Lars_Koeller@odie.physik2.Uni-Rostock.DE
Universitätsplatz 3 Anonymous ftp:
18051 Rostock ftp://odie.physik2.uni-rostock.de/pub
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190806.JAA20080>
