Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 19 Feb 1996 20:12:31 +1030 (CST)
From:      Michael Smith <msmith@atrad.adelaide.edu.au>
To:        Lars_Koeller@odie.physik2.uni-rostock.de (Lars Koeller)
Cc:        msmith@atrad.adelaide.edu.au, freebsd-questions@freefall.freebsd.org
Subject:   Re: Crack freeBSD password file
Message-ID:  <199602190942.UAA00526@genesis.atrad.adelaide.edu.au>
In-Reply-To: <199602190806.JAA20080@odie.physik2.uni-rostock.de> from "Lars Koeller" at Feb 19, 96 09:06:02 am

next in thread | previous in thread | raw e-mail | index | archive | help
Lars Koeller stands accused of saying:
> > 
> > You will have to modify the 'crack' program to understand the longer MD5
> > encrypted passwords that FreeBSD uses.  I would expect that this should be
> > a relatively straightforward task, but I'm not familiar with 'crack'.
> > 
> > Anyone else done this already and can supply Andre' with the diffs?
> 
>       How do  you want  to crack a   password you can't read? FreeBSD  uses
>    shadow passwords only root can read!

The idea is not to crack passwords, but to find stupid ones that would be
vulnerable to a casual attack.

>    Lars

-- 
]] Mike Smith, Software Engineer        msmith@atrad.adelaide.edu.au    [[
]] Genesis Software                     genesis@atrad.adelaide.edu.au   [[
]] High-speed data acquisition and      (GSM mobile) 0411-222-496       [[
]] realtime instrument control          (ph/fax)  +61-8-267-3039        [[
]] Collector of old Unix hardware.      "I seek PEZ!" - The Tick        [[



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190942.UAA00526>