-
July 4th, 2002, 07:52 AM
#1
Just An Idea about Password Cracker
This is basically my first tutorial.It is on how UNIX password cracking is accomplished by attac kers.Im going to "Attempt" To draw out a few simple graphs on how it works.
-------- cat -------------> __encryption ---------> _Unix Password File
--------
Dictionary File
Lets Analyze this.First The Word "Cat" is obviously a word from the dictionary file.
Then the word "Cat" is compared to the password file until it finds a match.
That is basically how John , cracker jack , and all that other bugua work out there.
I know this isnt much , but its my first tutorial , so gimme a feedback.
-N
"Serenity is not the absence of conflict, but the ability to cope with it."
-
July 4th, 2002, 10:26 AM
#2
Eeeeh... Aren't you a little short for a tutorial? Why isn't this on the tutorials forum then? Why didn't you complete your tutorial before posting it, this current piece kinda sucks?
1. I assume you are trying to say that the password is "cat". The word "cat" isn't compared to anything because we don't know it yet. The words are taken from the dictionary file and it is tried if the password is the one. If not, the next word from the dictionary file is taken and tried. It's like having a huge chain of keys, everyone tried at their turn until the right one is found. Alternative would be to make every possible key and try them.
Let's assume that keys are like bytes: 01010101 is a word, so is 00110100, but 10011000 is not. Dictionary files contain the character combinations that form words, brute force crackers try every possible combination. Dictionary crackers rely on the fact that most people don't use very cryptic passwords.
Hell, shoul *I* post this to the tutorials forum now?
Q: Why do computer scientists confuse Christmas and Halloween?
A: Because Oct 31 = Dec 25
-
July 4th, 2002, 04:47 PM
#3
Um.....a bit VERY short, and not exactly detailed.......
Still, it was a try
- Noia
PS: Next time, look for some info to back up you'r Tut...
With all the subtlety of an artillery barrage / Follow blindly, for the true path is sketchy at best. .: Bring OS X to x86!:.
Og ingen kan minnast dei linne drag i dronningas andlet den fagre dag Då landet her kvilte i heilag fred og alle hadde kjærleik å elske med.
-
July 4th, 2002, 04:55 PM
#4
Junior Member
-
July 4th, 2002, 06:25 PM
#5
yeah but u get shadowed passwd files nowadays, which rules out john the ripper, newer linuxes have /etc/passwd cyphertext in /etc/shadow and that is only accesible by root, and if the admin decides to on an older *nix system he can shadow the passwd file too.
Preep
http://www.attrition.org/gallery/computing/forum/tn/youarenot.gif.html
-
July 4th, 2002, 08:49 PM
#6
Oh come on, he doesn't deserve negs for this post. No-one deserves negs for writing a tutorial! Someone might find some information here they can't find anywhere else.
For a first tutorial, it's pretty short. Trying re-writing this tutorial and go into DES and shadow files more in-depth. Then edit this post and replace it with your new tutorial.
Thanks for trying though.
-
July 5th, 2002, 01:42 PM
#7
Junior Member
that was so, so, so unbelievably poor, it didnt explain anything at all to me......
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|