Sponsored Content
Full Discussion: Finding Password
Top Forums UNIX for Dummies Questions & Answers Finding Password Post 302212864 by jhtrice on Tuesday 8th of July 2008 03:14:58 PM
Old 07-08-2008
Other than finding it in a file the only other possibility is to crack it using john or a program like that. If the password is good it should take forever to crack it but it has been my experience that 50% of shared ftp passwords are pretty easy to crack.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Change password by pushing encrypted password to systems

I'm tasked to change a user's password on multiple Linux systems (RH v3). I though copying the encrypted password from one Linux /etc/shadow file to another would work but I was wrong. The long term solution is to establish an openLDAP Directory service, but for now I'm stuck with a manual... (1 Reply)
Discussion started by: benq70
1 Replies

2. Shell Programming and Scripting

finding duplicate files by size and finding pattern matching and its count

Hi, I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern. Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies

3. UNIX for Advanced & Expert Users

password verification verify password of a user for only first 8 characters

Helo , I m using linux pam library for user and its password authentication. I m creating new user and giving its password.I m giving password of 10 characters.now when I login in as that newly created user its ask me $ su - ram Password: You are required to change your password immediately... (12 Replies)
Discussion started by: amitpansuria
12 Replies

4. Shell Programming and Scripting

how to change root password using shell script with standard password

Hi Friends. I am new to scripting now i want to change the root password using the script with standard password. which is the easy scripting to learn for the beginner, Thanks in advance. (2 Replies)
Discussion started by: kurva
2 Replies

5. Solaris

SSH Password-less login fails on password expiry.

Hi Gurus I have a few Sol 5.9 servers and i have enabled password less authentication between them for my user ID. Often i have found that when my password has expired,the login fails. Resetting my password reenables the keys. Do i need to do something to avoid this scenario or is this... (2 Replies)
Discussion started by: Renjesh
2 Replies

6. OS X (Apple)

OSX asks password but i don't use a password!!

When i try to install some software OSX asks for a password but i don't use a password at all. Somebody knows a answer please??? asta (4 Replies)
Discussion started by: astapopulos
4 Replies

7. UNIX for Dummies Questions & Answers

password protect a CSV file: better solution than ZIP password?

Hi We send *.csv with sensitive data to our customers. Our customers open those files with Excel. A new requirement is that we password protect those CSV files. I thought to pack them with ZIP and assign a password to the archive. But Solaris 10 can't encrypt ZIP files. $ zip -P... (12 Replies)
Discussion started by: slashdotweenie
12 Replies

8. Shell Programming and Scripting

SFTP prompting for password even though password is in script

Hi All, I am trying to transfer a file from one server to a remote server using SFTP. Client is not ready for key setup. I am working on Solaris 10. Here is the code. #!/bin/ksh # sample automatic Sftp script to dump a file USER="user1" PASSWORD="pass1" HOST="host1" sftp $USER@$HOST... (6 Replies)
Discussion started by: megha2525
6 Replies

9. Forum Support Area for Unregistered Users & Account Problems

Password sent via reset password email is 'weak' and won't allow me to change my password

I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login. Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
CRACK(8)						      System Manager's Manual							  CRACK(8)

NAME
Crack, Reporter - programs to break password files SYNOPSIS
Crack [options] [-fmt format] [file ...] Crack-Reporter [-quiet] [-html] DESCRIPTION
This manual page documents briefly the Crack, and Crack-Reporter commands. This manual page was written for the Debian GNU/Linux distribu- tion because the original program does not have a manual page. Instead, there is some documentation available at /usr/share/doc/crack which you are encouraged to read Crack is not a program designed to break the password of every user in the file. Rather, it is designed to find weak passwords in the file, by attacking those sorts of bad passwords which are most likely to be used, in the order in which they would most easily be found (ie: are most likely to be used by a moronic user). Crack is not designed to break user passwords; it is designed to break password files. This is a subtle but important distinction. Crack-Reporter will show what passwords have been cracked, as well as view errors that have been detected in the source password files, etc. Guesses are listed chronologically, so users who wish to see incremental changes in the output as Crack continues to run over a course of days or weeks, are encouraged to wrap invocations of Crack-Reporter in a script with diff. OPTIONS
A summary of options are included below. For Crack: -makedict Creates and compresses the dictionaries Crack will use -makeonly Compiles the binaries for Crack (not necessary for Debian GNU/Linux since they are already provided) -debug Lets you see what the Crack script is doing. -recover Used when restarting an abnormally-terminated run; suppresses rebuild of the gecos-derived dictionaries. -fgnd Runs the password cracker in the foreground, with stdin, stdout and stderr attached to the usual places. -fmt format Specifies the input file format. -from N Starts password cracking from rule number "N". -keep Prevents deletion of the temporary file used to store the password cracker's input. -mail E-Mail a warning message to anyone whose password is cracked. See the script nastygram. -network Runs the password cracker in network mode. -nice N Runs the password cracker at a reduced priority, so that other jobs can take priority over the CPU. -kill filename -remote Internal options used to support networking. For Crack-Reporter -html Produces output in a fairly basic HTML-readable format. -quiet Suppresses the reporting of errors in the password file (corrupt entries, etc) EXAMPLES
To run Crack # Crack -nice 10 /etc/passwd If a Crack session is killed accidentally, it can be restarted with moderate efficiency by doing: mv run/Dhostname.N run/tempfilename Crack -recover -fmt spf run/tempfilename However if all you wish to do is start cracking passwords from some specific rule number, or to restart a run whilst skipping over a few rulesets, try: Crack [-recover] -from N filename ... ...where N is the number of the rule to start working from. FILES
/usr/share/Crack Location of the Crack program and scripts. /var/lib/Crack/ Location for the temporary files used by Crack. SEE ALSO
You will find more documentation about Crack in the text files available in /usr/share/doc/crack-common Documentation includes the pro- gram's Manual (in HTML and Text files), the User's Frequently Asked Questions (FAQ), examples, articles and even some humour. AUTHOR
This manual page was written by Javier Fernandez-Sanguino <jfs@debian.org>, for the Debian GNU/Linux system (but may be used by others). Crack and Crack-Reporter (originally called Reporter) were written by Alec Muffett <Alec.Muffett@UK.Sun.COM> CRACK(8)
All times are GMT -4. The time now is 12:37 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy