LinuxQuestions.org
Review your favorite Linux distribution.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices

Closed Thread
 
Search this Thread
Old 04-26-2007, 10:52 PM   #1
cad
Member
 
Registered: Dec 2006
Distribution: Fedora core 4
Posts: 92

Rep: Reputation: 15
john the ripper rules


First things first.
This is not meant as a cracking question, its meant as a hacking question.
Can someone please tell me how do I get a password, if for example I know for sure that a particular character appears or not and also another character I know appears in say, 4th position.

EDIT: get password from the /etc/shadow file

Last edited by cad; 04-27-2007 at 11:21 AM.
 
Old 04-27-2007, 07:46 AM   #2
reverse
Member
 
Registered: Apr 2007
Distribution: Gentoo
Posts: 337

Rep: Reputation: 30
#1. What are the meanings of "cracking" and "hacking" in your post?
#2. Get a password from where?
 
Old 04-27-2007, 08:08 AM   #3
crabboy
Moderator
 
Registered: Feb 2001
Location: Atlanta, GA
Distribution: Slackware
Posts: 1,823

Rep: Reputation: 120Reputation: 120
Hacking or cracking call it what you want. Trying to obtain someone else’s password by searching a stream or files is malicious and neither LQ nor its users will help you with your endeavor.

http://www.linuxquestions.org/rules.php

* Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed.
 
Old 04-27-2007, 10:10 AM   #4
cad
Member
 
Registered: Dec 2006
Distribution: Fedora core 4
Posts: 92

Original Poster
Rep: Reputation: 15
Quote:
Originally Posted by reverse
#1. What are the meanings of "cracking" and "hacking" in your post?
#2. Get a password from where?
Cracking means stealing someone else's password for malicious reasons or doing something to harm others. Hacking means exploring everything.
Now I call this hacking because I will know how much time does it take for my password to be cracked by testing it out myself. Just to weigh my chances of being secure if someone might be doing shoulder browsing. And I just want to explore everything. That's it.



Quote:
Originally Posted by crabboy
Hacking or cracking call it what you want. Trying to obtain someone else’s password by searching a stream or files is malicious and neither LQ nor its users will help you with your endeavor.

http://www.linuxquestions.org/rules.php

* Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed.
Thanks anyway.I will search for it somewhere else and also post it for others benefit so that they will understand the risk of letting others know even a single letter of their password.

Not that there aren't other forums on this small www.
Only that people here are sensible and understanding.

Thank you

Last edited by cad; 04-27-2007 at 10:13 AM.
 
Old 04-27-2007, 10:17 AM   #5
phantom_cyph
Senior Member
 
Registered: Feb 2007
Location: My HDD...
Distribution: WinXP for designing, Linux for life.
Posts: 2,329
Blog Entries: 1

Rep: Reputation: 47
Heres a vote for cad. Hacking and Cracking are NOT the same thing.

If you are entering a system to do something malicious, that is cracking. If hacking is the same thing, sue Yahoo, Google, Microsoft, Dogpile, Macintosh, any given Government. Have fun!
 
Old 04-27-2007, 10:26 AM   #6
crabboy
Moderator
 
Registered: Feb 2001
Location: Atlanta, GA
Distribution: Slackware
Posts: 1,823

Rep: Reputation: 120Reputation: 120
This is NOT going to turn into a hacking/cracking flame. There are plenty of threads on this forum already debating that. Stealing passwords is stealing passwords there is no hack or crack about it. Cad, if you were attempting to find out how things work, he went about it the wrong way. Your first post was very vague about pattern matching passwords and you gave no indication about where and how you were obtaining these passwords. We see plenty of kids trying to get their hands on malicious programs and scripts and LQ will play no part in it.
 
Old 04-27-2007, 11:00 AM   #7
Zention
Member
 
Registered: Mar 2007
Posts: 119

Rep: Reputation: 16
Ok John the Ripper does not come with man or info pages, so I will help you get to the docs (though of course there is probably something online).

locate johntheripper | grep OPTIONS

or

john

EXAMPLES has a lot of examples

--rules is probably what you are after in-conjunction with a filtered word list.

http://sectools.org/crackers.html

It is a bit odd how cracking has become to mean something illegal/immoral, really cracking is the breaking of secured data, hacking is the use of technology beyond the creator's intended purpose.

Last edited by Zention; 04-27-2007 at 11:07 AM.
 
Old 04-27-2007, 12:31 PM   #8
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 781
Blog Entries: 8

Rep: Reputation: 157Reputation: 157
Quote:
Originally Posted by Zention
It is a bit odd how cracking has become to mean something illegal/immoral, really cracking is the breaking of secured data, hacking is the use of technology beyond the creator's intended purpose.
I think what crabboy is getting at is cad's apparent intentions. I don't think his concern is a debate on the terminology of hacking vs. cracking. The way cad conveyed his information (or lack of) maybe gave crabboy an indication that he was maybe up to no good?
 
Old 04-27-2007, 12:56 PM   #9
win32sux
Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 371Reputation: 371Reputation: 371Reputation: 371
I'm closing this thread, for reasons already stated by crabboy in post #3.

If you have any questions regarding this closure, please contact me via email.

Last edited by win32sux; 05-01-2007 at 10:51 AM.
 
  


Closed Thread

Tags
john, ripper, security, tools


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
John the Ripper help BigChuckP Linux - Security 3 02-10-2006 09:44 AM
john the ripper re2 Linux - Security 5 02-26-2005 11:06 PM
John the Ripper Baix Linux - Software 2 02-21-2005 11:05 AM
John the ripper Ephracis Linux - Software 2 12-01-2004 12:27 AM
John the Ripper settings samshiver Linux - Software 2 02-06-2004 04:12 PM


All times are GMT -5. The time now is 10:09 PM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration