Date: Mon, 19 Feb 1996 01:56:27 -0700 (MST) From: Dave Andersen <angio@aros.net> To: Lars_Koeller@odie.physik2.uni-rostock.de (Lars Koeller) Cc: msmith@atrad.adelaide.edu.au, freebsd-questions@freefall.freebsd.org Subject: Re: Crack freeBSD password file Message-ID: <199602190856.BAA06180@terra.aros.net> In-Reply-To: <199602190806.JAA20080@odie.physik2.uni-rostock.de> from "Lars Koeller" at Feb 19, 96 09:06:02 am
next in thread | previous in thread | raw e-mail | index | archive | help
Lo and behold, Lars Koeller once said: > > You will have to modify the 'crack' program to understand the longer MD5 > > encrypted passwords that FreeBSD uses. I would expect that this should be > > a relatively straightforward task, but I'm not familiar with 'crack'. > > > > Anyone else done this already and can supply Andre' with the diffs? > > How do you want to crack a password you can't read? FreeBSD uses > shadow passwords only root can read! Because you never know when someone's going to find a security hole that lets someone read files on your system with root permission? :-) <insert something here about sendmail, wu-ftpd, etc.> -Dave Andersen -- angio@aros.net Complete virtual hosting and business-oriented system administration Internet services. (WWW, FTP, email) http://www.aros.net/ http://www.aros.net/about/virtual/ "There are only two industries that refer to thier customers as 'users'."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190856.BAA06180>