Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Distribution: Slack 8.1, Gentoo 1.3a, Red Hat 7.3, Red Hat 7.2, Manrake 8.2
Posts: 328
Rep:
Help using Crack for testing password strength
Hi all Ive configured and installed Crack to work with Tara however as Im using Shadow passwords Tara isnt checking /etc/shadow only /etc/passwd
Ive tried running Crack /etc/Shadow manually then I try running ./Reporter
and get output similar to following: -
---- passwords cracked as of Tue Jul 1 23:57:37 UTC 2003 ----
---- errors and warnings ----
bad format: /etc/shadow: adm:*:9797:0:::::
bad format: /etc/shadow: bin:*:9797:0:::::
bad format: /etc/shadow: chroot:$dfgregjpij454r0ffegr4tg4
bad format: /etc/shadow: rpc:*:9797:0:::::
bad format: /etc/shadow: shutdown:*:9797:0:::::
bad format: /etc/shadow: smmsp:*:9797:0:::::
bad format: /etc/shadow: sync:*:9797:0:::::
bad format: /etc/shadow: uucp:*:9797:0:::::
bad format: /etc/shadow: webuser:!:15y5y5y5y54yy:7thytrh453:::
---- done ----
Obviously Ive edited the posted output so no real passwords are included but does this bad format mean that I have chosen a weak password or is there a problem with Crack???? (I am checking /etc/shadow as root).
Just wondering because I tried a password similar to follows: -
1Q_3=+de£_r£3:;[pY&(grcN?><+G|\¬`@fEWQ%C"_eFyT
and it only took like 1 minute for Crack to end and for it to be added to the above list.
Can Anybody help??? Ive tried searching for help with the Reporter tool but cant fibnd anything
I haven't tried crack on Linux, but I have run it a lot on AIX. As far as I know, it only works on traditional (i.e. no shadow) format /etc/passwd style files.
In AIX there's a command to merge the shadow and passwd files and get this popping out, which makes life very easy. There should be some similar utility you can run to merge the two. Then you put the merged version in a new file and run crack against that.
Iain.
Edited to add To test this theory, copy /etc/passwd and paste in an encrypted password string for an easily crackable password. Run crack and it should crack it within a few seconds.
Distribution: Slack 8.1, Gentoo 1.3a, Red Hat 7.3, Red Hat 7.2, Manrake 8.2
Posts: 328
Original Poster
Rep:
Cheers, Ive now downloaded Jack the Ripper and Apparrently after using the unshadow utility from this it appears that my passwords are actually MD5 hash's, I thought they were Des based.
From what I can see Crack on ly works (by default) on Des based encryption which would seem to be one of the problems that I have.
Jack has been running non-stop since 10 this morning and still hasnt cracked all of my passwords (only 3) So I think I can safely assume that thier relatively strong.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.