Sponsored Content
Full Discussion: John the Ripper / CRACK
Operating Systems Linux Red Hat John the Ripper / CRACK Post 302384795 by stevej123 on Wednesday 6th of January 2010 10:21:44 AM
Old 01-06-2010
John the Ripper / CRACK

Has anyone used JTR or CRACK to check if you have any weak passwords on your Red Hat Servers? If so can I ask some basic questions? Or would this question be better pitched in another area of the Forum, if so please suggest where, if anyone is willing to help me in this forum please let me know...
 

5 More Discussions You Might Find Interesting

1. Cybersecurity

WEP Crack Appz

Looking for a good app to go with my iBook/Airport Extreme card for testing WEP security on my own network... I have had a lot of luck with MacStumbler, but none with KisMAC... any suggestions? Jeffrey d9rw1n:/ root#grep ghost There's nothing like bludgeoning your self with a new box...... (0 Replies)
Discussion started by: f1r3g0dz
0 Replies

2. Shell Programming and Scripting

Need help before i crack up!

Hi guys, i'm new to the forum, i need a script badly everything i try is awful as i'm new to this and usually i jump in at the deepend....however this unix scripting has got the better of me...hope someone can help! firstly the script will prompt the user for a filename in the current directory,... (6 Replies)
Discussion started by: Alendrin
6 Replies

3. UNIX and Linux Applications

John the Ripper application question

Hi Friends I like to know one thing the how exactly john the ripper works. I have search in google, read lots of tutorial on that. I have simple question, can I get the password for the encrypted file for the following example. e.g : Abc.txt file contents "This is Joy" Now I... (4 Replies)
Discussion started by: itsjoy2u
4 Replies

4. Cybersecurity

John the ripper

Hi evryone, I have problem the john program. It works correctly but I can not make unshadow command because I have removed the file /usr/bin/john by mistake # cd ../run # ./john /root/shadow Loaded 2 password hashes with 2 different salts (FreeBSD MD5 ) letmein (root) letmein ... (5 Replies)
Discussion started by: bander2009
5 Replies

5. What is on Your Mind?

Can you crack it?

Inspired by the GCHQ talent spotting code-cracker competition :eek:, here is my own little brain puzzler for budding cracker enthusiasts. Can you crack this code? If you think you know the answer, post it here (edited). There are no rewards, short of the feeling of smugness and some potential... (2 Replies)
Discussion started by: cambridge
2 Replies
CRACK(8)						      System Manager's Manual							  CRACK(8)

NAME
Crack, Reporter - programs to break password files SYNOPSIS
Crack [options] [-fmt format] [file ...] Crack-Reporter [-quiet] [-html] DESCRIPTION
This manual page documents briefly the Crack, and Crack-Reporter commands. This manual page was written for the Debian GNU/Linux distribu- tion because the original program does not have a manual page. Instead, there is some documentation available at /usr/share/doc/crack which you are encouraged to read Crack is not a program designed to break the password of every user in the file. Rather, it is designed to find weak passwords in the file, by attacking those sorts of bad passwords which are most likely to be used, in the order in which they would most easily be found (ie: are most likely to be used by a moronic user). Crack is not designed to break user passwords; it is designed to break password files. This is a subtle but important distinction. Crack-Reporter will show what passwords have been cracked, as well as view errors that have been detected in the source password files, etc. Guesses are listed chronologically, so users who wish to see incremental changes in the output as Crack continues to run over a course of days or weeks, are encouraged to wrap invocations of Crack-Reporter in a script with diff. OPTIONS
A summary of options are included below. For Crack: -makedict Creates and compresses the dictionaries Crack will use -makeonly Compiles the binaries for Crack (not necessary for Debian GNU/Linux since they are already provided) -debug Lets you see what the Crack script is doing. -recover Used when restarting an abnormally-terminated run; suppresses rebuild of the gecos-derived dictionaries. -fgnd Runs the password cracker in the foreground, with stdin, stdout and stderr attached to the usual places. -fmt format Specifies the input file format. -from N Starts password cracking from rule number "N". -keep Prevents deletion of the temporary file used to store the password cracker's input. -mail E-Mail a warning message to anyone whose password is cracked. See the script nastygram. -network Runs the password cracker in network mode. -nice N Runs the password cracker at a reduced priority, so that other jobs can take priority over the CPU. -kill filename -remote Internal options used to support networking. For Crack-Reporter -html Produces output in a fairly basic HTML-readable format. -quiet Suppresses the reporting of errors in the password file (corrupt entries, etc) EXAMPLES
To run Crack # Crack -nice 10 /etc/passwd If a Crack session is killed accidentally, it can be restarted with moderate efficiency by doing: mv run/Dhostname.N run/tempfilename Crack -recover -fmt spf run/tempfilename However if all you wish to do is start cracking passwords from some specific rule number, or to restart a run whilst skipping over a few rulesets, try: Crack [-recover] -from N filename ... ...where N is the number of the rule to start working from. FILES
/usr/share/Crack Location of the Crack program and scripts. /var/lib/Crack/ Location for the temporary files used by Crack. SEE ALSO
You will find more documentation about Crack in the text files available in /usr/share/doc/crack-common Documentation includes the pro- gram's Manual (in HTML and Text files), the User's Frequently Asked Questions (FAQ), examples, articles and even some humour. AUTHOR
This manual page was written by Javier Fernandez-Sanguino <jfs@debian.org>, for the Debian GNU/Linux system (but may be used by others). Crack and Crack-Reporter (originally called Reporter) were written by Alec Muffett <Alec.Muffett@UK.Sun.COM> CRACK(8)
All times are GMT -4. The time now is 07:34 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy