Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 19 Feb 1996 09:06:02 +0100
From:      Lars Koeller <Lars_Koeller@odie.physik2.uni-rostock.de>
To:        msmith@atrad.adelaide.edu.au
Cc:        freebsd-questions@freefall.FreeBSD.org
Subject:   Re: Crack freeBSD password file
Message-ID:  <199602190806.JAA20080@odie.physik2.uni-rostock.de>
In-Reply-To: Mail from 'Michael Smith <msmith@atrad.adelaide.edu.au>' dated: Mon, 19 Feb 1996 12:46:09 %2B1030 (CST)

next in thread | previous in thread | raw e-mail | index | archive | help

   Hi!

> Andre' Carvalho stands accused of saying:
> > 
> > I would like to know if I can use a program like "crack" to try to break =
> > my users' passwords. This is very important because I do not want to =
> > have security holes in this machine.
> > 
> > I tried a lot, but it says that the crypt() function is not standard and =
> > that the encrypted passwords are too long.
> 
> You will have to modify the 'crack' program to understand the longer MD5
> encrypted passwords that FreeBSD uses.  I would expect that this should be
> a relatively straightforward task, but I'm not familiar with 'crack'.
> 
> Anyone else done this already and can supply Andre' with the diffs?

      How do  you want  to crack a   password you can't read? FreeBSD  uses
   shadow passwords only root can read!

   Regards

   Lars


-- 
____________________________________________________________________________
Lars Köller			 Phone:  +49 381/498-1665, Fax: -1667
Universität Rostock (Germany)	 E-Mail: 
Fachbereich Physik                 Lars_Koeller@odie.physik2.Uni-Rostock.DE
Universitätsplatz 3		 Anonymous ftp:
18051 Rostock                      ftp://odie.physik2.uni-rostock.de/pub




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190806.JAA20080>