Sponsored Content
Special Forums Cybersecurity Cracking complex passwords (/etc/shadow) Post 302588523 by bcaseiro on Monday 9th of January 2012 08:11:01 AM
Old 01-09-2012
Cracking complex passwords (/etc/shadow)

I'm doing some labs regarding password cracking on Linux machines. I took the shadow file from one of my virtual machines and it looks like below:

bruno:$1$mrVjnhtj$bg47WvwLXN4bZrUNCf1Lh.:14019:0:99999:7:::

From my understanding the most important piece regarding password cracking on linux are indicated below:
bruno ==> username
$1$ ==> Indicates MD5 type
mrVjnhtj ==> Salt
bg47WvwLXN4bZrUNCf1Lh. ==> Encrypted salted and hashed password.

In this specific case my password is "windows".

However, let suppose that I don't know the password. I found that there are lot of MD5 rainbow tables available out there, however, these rainbow tables do not accept "shadowed" MD5 hashes. So AFAIK, I'd need a tool to convert my shadowed hash "$1$mrVjnhtj$bg47WvwLXN4bZrUNCf1Lh." into a simple MD5 hash. And then run the pure MD5 hash against a rainbow table.

Can somebody confirm if this is procedure is the correct one for complex passwords? Also what tools could be used to do this convertion?

Note: A more complex password exame would be:
bruno2:$1$F.MtLWar$6qb9wk66ySUrhI3OQzW3n0:14896:0:99999:7:::

Any info will be very appreciated.

THanks,
Bruno
 

4 More Discussions You Might Find Interesting

1. Solaris

Passwords in /etc/shadow file

I want to import my passwd/shadow files from Solaris 6 to Solaris 10. I found that the encryption method for passwords has changed. Is there a command or script to convert the Solaris 6 passwords to Solaris 10? I have searched the net and just can't seem to find the answer. For Example: The... (6 Replies)
Discussion started by: westsiderick
6 Replies

2. UNIX for Dummies Questions & Answers

cracking the root password

i am using a scounix server with oracle8i.one fine morning it says 'incorrect login' for the root.But the oracle user is logged in and the Database is ready for use.But the server is switched off without proper shutdown.Please suggest some way to get the root password without any reinstallation. (2 Replies)
Discussion started by: thenmozhi
2 Replies

3. Programming

Shadow Passwords

I'm writing a 'C' program on various systems (HP-UX, Solaris, AIX, NCR) which needs to interact with a user's password. Some of my systems are using the shadow password and some are not. It is possible for some of my systems to have /etc/shadow, even though the box is not using the file (I know,... (4 Replies)
Discussion started by: chrisc@nwark.ne
4 Replies

4. UNIX for Advanced & Expert Users

When did UNIX start using encrypted passwords, and not displaying passwords when you type them in?

I've been using various versions of UNIX and Linux since 1993, and I've never run across one that showed your password as you type it in when you log in, or one that stored passwords in plain text rather than encrypted. I'm writing a script for work for a security audit, and two of the... (5 Replies)
Discussion started by: Anne Neville
5 Replies
crypt_bsdmd5(5) 					Standards, Environments, and Macros					   crypt_bsdmd5(5)

NAME
crypt_bsdmd5 - password hashing module using MD5 message hash algorithm SYNOPSIS
/usr/lib/security/$ISA/crypt_bsdmd5.so DESCRIPTION
The crypt_bsdmd5 module is a one-way password hashing module for use with crypt(3C) that uses the MD5 message hash algorithm. The algorithm identifier for crypt.conf(4) and policy.conf(4) is 1. The output is compatible with md5crypt on BSD and Linux systems. The maximum password length for crypt_bsdmd5 is 255 characters. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |MT-Level |Safe | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol- icy.conf(4), attributes(5) SunOS 5.10 6 Aug 2003 crypt_bsdmd5(5)
All times are GMT -4. The time now is 01:00 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy