Penetration Testing mailing list archives
Re: Etc/shadow file and john
From: Sherwyn Williams <sherwill22 () tmail com>
Date: Thu, 28 Jul 2005 06:50:02 -0400
Thanks I will try that and report my results later On Thu, 28 Jul 2005 2:03, frank boldewin wrote:
are you just using the shadow file? to crack it with john you have to correlate it with the passwd file.there should be a tool in your john directory, which is called unshadow.so safe the shadow and passwd from the machine and do the following: unshadow passwd.txt shadow.txt > tocrack.txt then tocrack.txt can be cracked by john hope that helps. cheers, frank----- Original Message ----- From: "Sherwyn Williams" <sherwill22 () tmail com>To: <pen-test () securityfocus com> Sent: Wednesday, July 27, 2005 6:56 PM Subject: Etc/shadow file and johnI am doing an assesment for passwords on a network, after getting the password file I piped the output to a text file, tried to run that against John and can't get any luck with the program. Do anyone here uses any other password programs, and is there a better format than a text file to store the out of the etc/shadow when trying to get the passes.Sherwyn Williams Technical Consultant Sherwill22 () tmail com
Sherwyn Williams Technical Consultant Sherwill22 () tmail com
Current thread:
- Etc/shadow file and john Sherwyn Williams (Jul 27)
- RE: Etc/shadow file and john Leandro Reox (Jul 28)
- Re: Etc/shadow file and john Sherwyn Williams (Jul 28)
- RE: Etc/shadow file and john Clement Dupuis (Jul 28)
- Re: Etc/shadow file and john Dave Spencer (Jul 28)
- Re: Etc/shadow file and john Terry Vernon (Jul 28)
- Re: Etc/shadow file and john frank boldewin (Jul 28)
- Re: Etc/shadow file and john Sherwyn Williams (Jul 28)
- Re: Etc/shadow file and john Wayne G (Jul 28)
- RE: Etc/shadow file and john Leandro Reox (Jul 28)