Results 1 to 7 of 7

Thread: Just An Idea about Password Cracker

  1. #1
    Senior Member n01100110's Avatar
    Join Date
    Jan 2002

    Post Just An Idea about Password Cracker

    This is basically my first tutorial.It is on how UNIX password cracking is accomplished by attac kers.Im going to "Attempt" To draw out a few simple graphs on how it works.

    -------- cat -------------> __encryption ---------> _Unix Password File

    Dictionary File

    Lets Analyze this.First The Word "Cat" is obviously a word from the dictionary file.
    Then the word "Cat" is compared to the password file until it finds a match.
    That is basically how John , cracker jack , and all that other bugua work out there.
    I know this isnt much , but its my first tutorial , so gimme a feedback.
    "Serenity is not the absence of conflict, but the ability to cope with it."

  2. #2
    Senior Member
    Join Date
    Oct 2001
    Helsinki, Finland
    Eeeeh... Aren't you a little short for a tutorial? Why isn't this on the tutorials forum then? Why didn't you complete your tutorial before posting it, this current piece kinda sucks?

    1. I assume you are trying to say that the password is "cat". The word "cat" isn't compared to anything because we don't know it yet. The words are taken from the dictionary file and it is tried if the password is the one. If not, the next word from the dictionary file is taken and tried. It's like having a huge chain of keys, everyone tried at their turn until the right one is found. Alternative would be to make every possible key and try them.
    Let's assume that keys are like bytes: 01010101 is a word, so is 00110100, but 10011000 is not. Dictionary files contain the character combinations that form words, brute force crackers try every possible combination. Dictionary crackers rely on the fact that most people don't use very cryptic passwords.
    Hell, shoul *I* post this to the tutorials forum now?
    Q: Why do computer scientists confuse Christmas and Halloween?
    A: Because Oct 31 = Dec 25

  3. #3
    Now, RFC Compliant! Noia's Avatar
    Join Date
    Jan 2002
    Um.....a bit VERY short, and not exactly detailed.......
    Still, it was a try

    - Noia

    PS: Next time, look for some info to back up you'r Tut...
    With all the subtlety of an artillery barrage / Follow blindly, for the true path is sketchy at best. .:Bring OS X to x86!:.
    Og ingen kan minnast dei linne drag i dronningas andlet den fagre dag Då landet her kvilte i heilag fred og alle hadde kjærleik å elske med.

  4. #4
    Junior Member
    Join Date
    Sep 2001
    what is that?

  5. #5
    Senior Member
    Join Date
    Oct 2001
    yeah but u get shadowed passwd files nowadays, which rules out john the ripper, newer linuxes have /etc/passwd cyphertext in /etc/shadow and that is only accesible by root, and if the admin decides to on an older *nix system he can shadow the passwd file too.


  6. #6
    Senior Member
    Join Date
    Nov 2001
    Oh come on, he doesn't deserve negs for this post. No-one deserves negs for writing a tutorial! Someone might find some information here they can't find anywhere else.
    For a first tutorial, it's pretty short. Trying re-writing this tutorial and go into DES and shadow files more in-depth. Then edit this post and replace it with your new tutorial.
    Thanks for trying though.

  7. #7
    Junior Member
    Join Date
    Jun 2002
    that was so, so, so unbelievably poor, it didnt explain anything at all to me......

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts