This is basically my first tutorial.It is on how UNIX password cracking is accomplished by attac kers.Im going to "Attempt" To draw out a few simple graphs on how it works.

-------- cat -------------> __encryption ---------> _Unix Password File

--------
Dictionary File

Lets Analyze this.First The Word "Cat" is obviously a word from the dictionary file.
Then the word "Cat" is compared to the password file until it finds a match.
That is basically how John , cracker jack , and all that other bugua work out there.
I know this isnt much , but its my first tutorial , so gimme a feedback.
-N