How Password Cracking Works (renewed)
Results 1 to 5 of 5

Thread: How Password Cracking Works (renewed)

  1. #1
    Senior Member n01100110's Avatar
    Join Date
    Jan 2002
    Posts
    348

    Post How Password Cracking Works (renewed)

    Ok , in this tutorial I am gonna explain how crackers would get into a system by brute forcing it.Brute force is using every single username and password combination , and throwing at the login prompt.I am going to explain to you how it works , how it is accomplished , and the legal actions you will take in doing this.Ok , now i am going to draw a graph on how it works.





    Dictionary file _________>Encryption__________>UNIX Password File
    00110100 GHtff.hgfre Dgfgjklk.zz

    No Match

    I am going to try to ellaborate on this the best I can.
    First a Random Word from the dictionary file is chosen and
    thrown at the system.(in this case it is 00110100)
    Then It undergoes encryption , which then it is encrypted
    to GHtff.hgfre.But the original UNIX password file is Dgfgjklk.zz
    right?So it doesnt find a match just yet.Now I am going to draw
    A Graph showing the UNIX password file being cracked.





    Dictionary file _________>Encryption__________>UNIX Password File
    youcantguessme Dgfgjklk.zz Dgfgjklk.zz



    The Encrypted Password is "youcantguessme".
    Password cracking is definetely best covered from local attack.

    Getting Busted Note

    Systems Administrators will not take it kindly by you getting into their systems , so I tell you now , be a good guy and if you do get their password file , tell them about it and how to secure it.So if you ever feel the tention to put on your Black Hat and be a pain in the ass , you cant say that I didnt warn you about the legal actions.So Be Nice!!
    -N
    "Serenity is not the absence of conflict, but the ability to cope with it."
    Share on Google+

  2. #2
    Senior Member
    Join Date
    Jun 2002
    Posts
    102
    What a crappy tutorial. I believe there is alot more then just that. Maybe you shouldn't post tutorials until you understand everything that is going on. Once you know more then you might wanna think about writing a tutorial. Just some advice.
    Good Grief
    Share on Google+

  3. #3
    Senior Member n01100110's Avatar
    Join Date
    Jan 2002
    Posts
    348
    I Understand whats going on , I just cant get it on paper.But it was worth a shot.
    -N
    "Serenity is not the absence of conflict, but the ability to cope with it."
    Share on Google+

  4. #4
    Banned
    Join Date
    Jun 2002
    Posts
    5

    Arrow

    IF U OR FRIENDS HAVE NE NEWS PASS IT ON I WILL DISTRIBUTE TJOLIV@HOTMAIL.COM NO CRAP MAIL
    Share on Google+

  5. #5
    Senior Member
    Join Date
    Nov 2001
    Location
    Ireland
    Posts
    735
    Originally posted here by tjoliv
    IF U OR FRIENDS HAVE NE NEWS PASS IT ON I WILL DISTRIBUTE
    WTF?

    This tutorial is definitely better than the first, but it's still very short. I think if you are going to go into how *nix encrypts the passwords, you should *actually* talk about the encryption method itself.
    You're gradually getting there
    On another note, I wouldn't advise posting new threads for a revised version of an original thread, there's an ``Edit`` button for a reason
    Share on Google+

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides