Sponsored Content
Operating Systems HP-UX [solved] HP-UX /etc/passwd file Post 302591101 by cjcox on Wednesday 18th of January 2012 01:43:52 PM
Old 01-18-2012
DES-crypt password can be brute forced fairly easily (may take some hardware resources for 8 char fairly random passwords though... and some time). You can use tools like John the Ripper to aid in doing this. If you're using the tcb for HP-UX, then the passwords I believe may be salted triple-DES... and even trying to brute force that is practically impossible.
 

10 More Discussions You Might Find Interesting

1. Cybersecurity

/etc/passwd file

hi Does anyone anyone know what the last line of a unix user passwd file signifes? Mine shows "+:::::" best (4 Replies)
Discussion started by: s_mad010
4 Replies

2. Shell Programming and Scripting

help in /etc/passwd file

Hi all, As all of us know that in /etc/passwd file the first field correspond to username could any one tell me what is bin , damoen etc in the first field, and r they in user field , what is nologin in the last column ? root:x:0:0:root:/root:/bin/bash ... (4 Replies)
Discussion started by: useless79
4 Replies

3. Solaris

A question on /etc/passwd file

I have a question here on /etc/passwd file. There is a user called user_a, when it is defined in /etc/passwd as below +user_a:x:::::/bin/ksh after user_a login, the system could not recognize the correct enviromental variable $USER_A_HOME which is defined in .kshrc file (under /home/user_a... (2 Replies)
Discussion started by: ij_2005
2 Replies

4. Shell Programming and Scripting

[solved] merging two files and writing to another file- solved

i have two files as file1: 1 2 3 file2: a b c and the output should be: file3: 1~a 2~b 3~c (1 Reply)
Discussion started by: mlpathir
1 Replies

5. Solaris

passwd cmd reenables passwd aging in shadow entry

Hi Folks, I have Solaris 10, latest release. We have passwd aging set in /etc/defalut/passwd. I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging. When I reset the users passwd using passwd command, it re enables... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies

6. UNIX for Dummies Questions & Answers

help with passwd file

Not an unix expert, I read a few pages on the web about passwd files, but I didn't find the answers I need about the last 8 lines of the passwd file I'm taking a look at. I'm assuming their shortcuts to another file that may have the actual usernames of users on the system. Please, any help... (1 Reply)
Discussion started by: fusion31
1 Replies

7. Solaris

[Solved] passwd command not working

Hi all, I have got a problem, i have Solaris 8 server, where on running the passwd command, it says permission denied. I have checked /bin/passwd, /etc/passwd, /etc/shadow all have permissions as like one working server. It is happening for root user and all other users. i have tried... (6 Replies)
Discussion started by: varunksharma87
6 Replies

8. AIX

When did AIX start using /etc/security/passwd instead of /etc/passwd to store encrypted passwords?

Does anyone know when AIX started using /etc/security/passwd instead of /etc/passwd to store encrypted passwords? (1 Reply)
Discussion started by: Anne Neville
1 Replies

9. Red Hat

Sudo to execute script without passwd[solved]

Hi Hope someone can sched some light i'm trying to execute a script via sudo but i don't want to be prompted for a password when i run the script using sudo my sudo entry does work in that the script gets executed but i'm having to give a password, my current entry is given below user1 ... (0 Replies)
Discussion started by: duckeggs01
0 Replies

10. UNIX for Dummies Questions & Answers

Reading etc/passwd file

I am new to UNIX and I am trying to read an etc/passwd file. I have 2 questions. 1) Looking at several of the User IDs, there are appears to be alphanumeric characters under the password column, for Root and Oracle. Does this mean that the password is not encrypted? 2) Should I be... (9 Replies)
Discussion started by: McMeatface
9 Replies
dircproxy-crypt(1)					      General Commands Manual						dircproxy-crypt(1)

NAME
dircproxy-crypt - Generate encrypted password for dircproxy SYNOPSIS
dircproxy-crypt [-hv] [password]... DESCRIPTION
dircproxy-crypt generates encrypted passwords for the dircproxy(1) configuration file. These passwords are used in the 'password' configu- ration option of a connection class, and are compared to the password you configure your IRC client to use. If you do not supply any plain text passwords to encrypt on the command line then dircproxy-crypt, when run, will ask you for one on stan- dard input. It will display the encrypted version of each password, created using your system's crypt(3) function and a random salt, on standard output. OPTIONS
-h Displays a brief help message detailing the command-line arguments, then exits. -v Displays the dircproxy version number that this version of dircproxy-crypt comes with, then exits. SEE ALSO
dircproxy(1) crypt(3) BUGS
Please submit and review bug reports at: http://bugzilla.dircproxy.net/ AUTHOR
Written by Scott James Remnant <scott@netsplit.com>. COPYRIGHT
Copyright (C) 2002 Scott James Remnant. All Rights Reserved. dircproxy is distributed under the GNU General Public License. 11 Jan 2001 dircproxy-crypt(1)
All times are GMT -4. The time now is 07:08 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy