Date: Mon, 19 Feb 1996 20:12:31 +1030 (CST) From: Michael Smith <msmith@atrad.adelaide.edu.au> To: Lars_Koeller@odie.physik2.uni-rostock.de (Lars Koeller) Cc: msmith@atrad.adelaide.edu.au, freebsd-questions@freefall.freebsd.org Subject: Re: Crack freeBSD password file Message-ID: <199602190942.UAA00526@genesis.atrad.adelaide.edu.au> In-Reply-To: <199602190806.JAA20080@odie.physik2.uni-rostock.de> from "Lars Koeller" at Feb 19, 96 09:06:02 am
next in thread | previous in thread | raw e-mail | index | archive | help
Lars Koeller stands accused of saying: > > > > You will have to modify the 'crack' program to understand the longer MD5 > > encrypted passwords that FreeBSD uses. I would expect that this should be > > a relatively straightforward task, but I'm not familiar with 'crack'. > > > > Anyone else done this already and can supply Andre' with the diffs? > > How do you want to crack a password you can't read? FreeBSD uses > shadow passwords only root can read! The idea is not to crack passwords, but to find stupid ones that would be vulnerable to a casual attack. > Lars -- ]] Mike Smith, Software Engineer msmith@atrad.adelaide.edu.au [[ ]] Genesis Software genesis@atrad.adelaide.edu.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control (ph/fax) +61-8-267-3039 [[ ]] Collector of old Unix hardware. "I seek PEZ!" - The Tick [[
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190942.UAA00526>