Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
04-26-2007, 11:52 PM
|
#1
|
Member
Registered: Dec 2006
Distribution: Fedora core 4
Posts: 92
Rep:
|
john the ripper rules
First things first.
This is not meant as a cracking question, its meant as a hacking question.
Can someone please tell me how do I get a password, if for example I know for sure that a particular character appears or not and also another character I know appears in say, 4th position.
EDIT: get password from the /etc/shadow file
Last edited by cad; 04-27-2007 at 12:21 PM.
|
|
|
04-27-2007, 08:46 AM
|
#2
|
Member
Registered: Apr 2007
Distribution: Gentoo
Posts: 337
Rep:
|
#1. What are the meanings of "cracking" and "hacking" in your post?
#2. Get a password from where?
|
|
|
04-27-2007, 09:08 AM
|
#3
|
Senior Member
Registered: Feb 2001
Location: Atlanta, GA
Distribution: Slackware
Posts: 1,821
Rep:
|
Hacking or cracking call it what you want. Trying to obtain someone else’s password by searching a stream or files is malicious and neither LQ nor its users will help you with your endeavor.
http://www.linuxquestions.org/rules.php
* Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed.
|
|
|
04-27-2007, 11:10 AM
|
#4
|
Member
Registered: Dec 2006
Distribution: Fedora core 4
Posts: 92
Original Poster
Rep:
|
Quote:
Originally Posted by reverse
#1. What are the meanings of "cracking" and "hacking" in your post?
#2. Get a password from where?
|
Cracking means stealing someone else's password for malicious reasons or doing something to harm others. Hacking means exploring everything.
Now I call this hacking because I will know how much time does it take for my password to be cracked by testing it out myself. Just to weigh my chances of being secure if someone might be doing shoulder browsing. And I just want to explore everything. That's it.
Quote:
Originally Posted by crabboy
Hacking or cracking call it what you want. Trying to obtain someone else’s password by searching a stream or files is malicious and neither LQ nor its users will help you with your endeavor.
http://www.linuxquestions.org/rules.php
* Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed.
|
Thanks anyway.I will search for it somewhere else and also post it for others benefit so that they will understand the risk of letting others know even a single letter of their password.
Not that there aren't other forums on this small www.
Only that people here are sensible and understanding.
Thank you
Last edited by cad; 04-27-2007 at 11:13 AM.
|
|
|
04-27-2007, 11:17 AM
|
#5
|
Senior Member
Registered: Feb 2007
Location: The Tropics
Distribution: Slackware & Derivatives
Posts: 2,472
Rep:
|
Heres a vote for cad. Hacking and Cracking are NOT the same thing.
If you are entering a system to do something malicious, that is cracking. If hacking is the same thing, sue Yahoo, Google, Microsoft, Dogpile, Macintosh, any given Government. Have fun!
|
|
|
04-27-2007, 11:26 AM
|
#6
|
Senior Member
Registered: Feb 2001
Location: Atlanta, GA
Distribution: Slackware
Posts: 1,821
Rep:
|
This is NOT going to turn into a hacking/cracking flame. There are plenty of threads on this forum already debating that. Stealing passwords is stealing passwords there is no hack or crack about it. Cad, if you were attempting to find out how things work, he went about it the wrong way. Your first post was very vague about pattern matching passwords and you gave no indication about where and how you were obtaining these passwords. We see plenty of kids trying to get their hands on malicious programs and scripts and LQ will play no part in it.
|
|
|
04-27-2007, 12:00 PM
|
#7
|
Member
Registered: Mar 2007
Posts: 119
Rep:
|
Ok John the Ripper does not come with man or info pages, so I will help you get to the docs (though of course there is probably something online).
locate johntheripper | grep OPTIONS
or
john
EXAMPLES has a lot of examples
--rules is probably what you are after in-conjunction with a filtered word list.
http://sectools.org/crackers.html
It is a bit odd how cracking has become to mean something illegal/immoral, really cracking is the breaking of secured data, hacking is the use of technology beyond the creator's intended purpose.
Last edited by Zention; 04-27-2007 at 12:07 PM.
|
|
|
04-27-2007, 01:31 PM
|
#8
|
Member
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Rep:
|
Quote:
Originally Posted by Zention
It is a bit odd how cracking has become to mean something illegal/immoral, really cracking is the breaking of secured data, hacking is the use of technology beyond the creator's intended purpose.
|
I think what crabboy is getting at is cad's apparent intentions. I don't think his concern is a debate on the terminology of hacking vs. cracking. The way cad conveyed his information (or lack of) maybe gave crabboy an indication that he was maybe up to no good?
|
|
|
04-27-2007, 01:56 PM
|
#9
|
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870
|
I'm closing this thread, for reasons already stated by crabboy in post #3.
If you have any questions regarding this closure, please contact me via email.
Last edited by win32sux; 05-01-2007 at 11:51 AM.
|
|
|
All times are GMT -5. The time now is 10:06 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|