Penetration Testing mailing list archives
Re: Etc/shadow file and john
From: "frank boldewin" <frank.boldewin () gmx de>
Date: Thu, 28 Jul 2005 07:58:47 +0200
are you just using the shadow file? to crack it with john you have to correlate it with the passwd file. there should be a tool in your john directory, which is called unshadow. so safe the shadow and passwd from the machine and do the following: unshadow passwd.txt shadow.txt > tocrack.txt then tocrack.txt can be cracked by john hope that helps. cheers, frank----- Original Message ----- From: "Sherwyn Williams" <sherwill22 () tmail com>
To: <pen-test () securityfocus com> Sent: Wednesday, July 27, 2005 6:56 PM Subject: Etc/shadow file and john
I am doing an assesment for passwords on a network, after getting the password file I piped the output to a text file, tried to run that against John and can't get any luck with the program. Do anyone here uses any other password programs, and is there a better format than a text file to store the out of the etc/shadow when trying to get the passes.Sherwyn Williams Technical Consultant Sherwill22 () tmail com
Current thread:
- Etc/shadow file and john Sherwyn Williams (Jul 27)
- RE: Etc/shadow file and john Leandro Reox (Jul 28)
- Re: Etc/shadow file and john Sherwyn Williams (Jul 28)
- RE: Etc/shadow file and john Clement Dupuis (Jul 28)
- Re: Etc/shadow file and john Dave Spencer (Jul 28)
- Re: Etc/shadow file and john Terry Vernon (Jul 28)
- Re: Etc/shadow file and john frank boldewin (Jul 28)
- Re: Etc/shadow file and john Sherwyn Williams (Jul 28)
- Re: Etc/shadow file and john Wayne G (Jul 28)
- RE: Etc/shadow file and john Leandro Reox (Jul 28)