Sponsored Content
Full Discussion: John the ripper
Special Forums Cybersecurity John the ripper Post 302437964 by bander2009 on Friday 16th of July 2010 09:46:13 PM
Old 07-16-2010
John the ripper

Hi evryone,

I have problem the john program. It works correctly but I can not make unshadow command because I have removed the file /usr/bin/john by mistake

Code:
[root@localhost src]# cd ../run
[root@localhost run]# ./john /root/shadow
Loaded 2 password hashes with 2 different salts (FreeBSD MD5 [32/32])
letmein          (root)
letmein          (joe)
guesses: 2  time: 0:00:00:00 100% (2)  c/s: 6579  trying: letmein

Then I removed /usr/bin/john, I could do shadow:

Code:
[root@localhost run]# ./john /root/shadow
No password hashes loaded
[root@localhost run]# umask 077
[root@localhost run]# unshadow /etc/passwd /etc/shadow > mypasswd2
bash: unshadow: command not found
[root@localhost ~]# which john
/usr/bin/which: no john in (/usr/lib/qt-3.3/bin:/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/sbin:/usr/sbin:/sbin:/usr/local/bin:/usr/bin:/bin:/root/bin)
You have mail in /var/spool/mail/root
[root@localhost ~]#


So could you help and advise me what should I do?

Last edited by pludi; 07-17-2010 at 07:33 AM.. Reason: code tags, please...
 

2 More Discussions You Might Find Interesting

1. UNIX and Linux Applications

John the Ripper application question

Hi Friends I like to know one thing the how exactly john the ripper works. I have search in google, read lots of tutorial on that. I have simple question, can I get the password for the encrypted file for the following example. e.g : Abc.txt file contents "This is Joy" Now I... (4 Replies)
Discussion started by: itsjoy2u
4 Replies

2. Red Hat

John the Ripper / CRACK

Has anyone used JTR or CRACK to check if you have any weak passwords on your Red Hat Servers? If so can I ask some basic questions? Or would this question be better pitched in another area of the Forum, if so please suggest where, if anyone is willing to help me in this forum please let me know... (1 Reply)
Discussion started by: stevej123
1 Replies
GZEXE(1)						      General Commands Manual							  GZEXE(1)

NAME
gzexe - compress executable files in place SYNOPSIS
gzexe name ... DESCRIPTION
The gzexe utility allows you to compress executables in place and have them automatically uncompress and execute when you run them (at a penalty in performance). For example if you execute ``gzexe /usr/bin/gdb'' it will create the following two files: -rwxr-xr-x 1 root root 1026675 Jun 7 13:53 /usr/bin/gdb -rwxr-xr-x 1 root root 2304524 May 30 13:02 /usr/bin/gdb~ /usr/bin/gdb~ is the original file and /usr/bin/gdb is the self-uncompressing executable file. You can remove /usr/bin/gdb~ once you are sure that /usr/bin/gdb works properly. This utility is most useful on systems with very small disks. OPTIONS
-d Decompress the given executables instead of compressing them. SEE ALSO
gzip(1), znew(1), zmore(1), zcmp(1), zforce(1) CAVEATS
The compressed executable is a shell script. This may create some security holes. In particular, the compressed executable relies on the PATH environment variable to find gzip and some standard utilities (basename, chmod, ln, mkdir, mktemp, rm, sleep, and tail). BUGS
gzexe attempts to retain the original file attributes on the compressed executable, but you may have to fix them manually in some cases, using chmod or chown. GZEXE(1)
All times are GMT -4. The time now is 03:58 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy