Date: Mon, 19 Feb 1996 09:06:02 +0100 From: Lars Koeller <Lars_Koeller@odie.physik2.uni-rostock.de> To: msmith@atrad.adelaide.edu.au Cc: freebsd-questions@freefall.FreeBSD.org Subject: Re: Crack freeBSD password file Message-ID: <199602190806.JAA20080@odie.physik2.uni-rostock.de> In-Reply-To: Mail from 'Michael Smith <msmith@atrad.adelaide.edu.au>' dated: Mon, 19 Feb 1996 12:46:09 %2B1030 (CST)
next in thread | previous in thread | raw e-mail | index | archive | help
Hi! > Andre' Carvalho stands accused of saying: > > > > I would like to know if I can use a program like "crack" to try to break = > > my users' passwords. This is very important because I do not want to = > > have security holes in this machine. > > > > I tried a lot, but it says that the crypt() function is not standard and = > > that the encrypted passwords are too long. > > You will have to modify the 'crack' program to understand the longer MD5 > encrypted passwords that FreeBSD uses. I would expect that this should be > a relatively straightforward task, but I'm not familiar with 'crack'. > > Anyone else done this already and can supply Andre' with the diffs? How do you want to crack a password you can't read? FreeBSD uses shadow passwords only root can read! Regards Lars -- ____________________________________________________________________________ Lars Köller Phone: +49 381/498-1665, Fax: -1667 Universität Rostock (Germany) E-Mail: Fachbereich Physik Lars_Koeller@odie.physik2.Uni-Rostock.DE Universitätsplatz 3 Anonymous ftp: 18051 Rostock ftp://odie.physik2.uni-rostock.de/pub
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190806.JAA20080>