02-15-2006
Though it is not recommended and banned in this forum ...
... you could search and try exploits, 4.3 is pretty old and should not be hard to crack
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I've forgotten root password on one of Solaris machines, i searched in forumes to find a similar case but there's no proceudre here to reinintialize root password, cause most of related commands & even single user mode needs root password that i don't have.
Any solution would be helpful.
--rgrds,... (9 Replies)
Discussion started by: nikk
9 Replies
2. UNIX for Advanced & Expert Users
Hello ...
I lost my password root !
maybe someone can to help me to log in HP_UX,
i started the server in " Singel - User" and i changed my
password to new password and it`s not working ..
what i must to do ??? (4 Replies)
Discussion started by: yanly
4 Replies
3. UNIX for Advanced & Expert Users
I have recently become the sys adm guy for our unix systems here for my shop. I have a pretty good understanding of the system, but there is just some stuff that I don't know. Right now one of those things is to recover the password for a unix system.
I know that there is a way that you can use... (2 Replies)
Discussion started by: GlockCW
2 Replies
4. Answers to Frequently Asked Questions
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies
5. Linux
wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies
6. UNIX for Dummies Questions & Answers
I'm attempting to blank out the root user password on a machine that we have forgotten the password for. I have been using the advice posted on this site to boot from CDROM in single user mode, then mounting the root slice and editing the /etc/shadow file. Each time I save the shadow file and... (1 Reply)
Discussion started by: gonzotonka
1 Replies
7. UNIX for Advanced & Expert Users
This is a common question im sure... I bought a RS/6000 Model 240. Aix 4.3.3 loaded. No root password was supplied to me, but I do have the install media (4 disks). I want to drop into maint mode. So I place the cd into the drive, restart the box ( by pressing the power button, since i do not have... (3 Replies)
Discussion started by: JoeJohnSmith
3 Replies
8. SCO
I dont have the cds, what can i do? (2 Replies)
Discussion started by: sopapa
2 Replies
9. UNIX for Dummies Questions & Answers
Hi guys,
we have "forget" the root password for 1 of our AIX machines,
how can we reset it? or recover it??
Thanks (1 Reply)
Discussion started by: prpkrk
1 Replies
10. Solaris
Hi All
Hope it's okay to post on this sub-forum, couldn't find a better place
I've got a 480R running solaris 8 with veritas volume manager managing all filesystems, including an encapsulated root disk (I believe the root disk is encapsulated as one of the root mirror disks has an entry under... (1 Reply)
Discussion started by: sunnyd76
1 Replies
LEARN ABOUT DEBIAN
psk-crack
PSK-CRACK(1) General Commands Manual PSK-CRACK(1)
NAME
psk-crack - Crack IKE Aggressive Mode Pre-Shared Keys
SYNOPSIS
psk-crack [options] <psk-parameters-file>
<psk-parameters-file> is a file containing the parameters for the pre-shared key cracking process in the format generated by ike-scan with
the --pskcrack (-P) option. This file can contain one or more entries. For multiple entries, each one must be on a separate line.
The program can crack either MD5 or SHA1-based hashes. The type of hash is automatically determined from the length of the hash (16 bytes
for MD5 or 20 bytes for SHA1). Each entry in the <psk-parameters-file> is handled separately, so it is possible to crack a mixture of MD5
and SHA1 hashes.
psk-crack can also crack the proprietary hash format used by Nortel Contivity / VPN Router systems. When cracking Nortel format hashes,
you need to specify the username of the hash that you are cracking with the --norteluser (-u) option. When cracking Nortel format hashes,
you can only crack one hash at a time.
By default, psk-crack will perform dictionary cracking using the default dictionary. The dictionary can be changed with the --dictionary
(-d) option, or brute-force cracking can be selected with the --bruteforce (-B) option.
DESCRIPTION
psk-crack attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack
option.
psk-crack can operate in two different modes:
1) Dictionary cracking mode: this is the default mode in which psk-crack tries each candidate word from the dictionary file in turn
until it finds a match, or all the words in the dictionary have been tried.
2) Brute-force cracking mode: in this mode, psk-crack tries all possible combinations of a specified character set up to a given
length.
OPTIONS
--help or -h
Display this usage message and exit.
--version or -V
Display program version and exit.
--verbose or -v
Display verbose progress messages.
--dictionary=<f> or -d <f>
Set dictionary file to <f>. The default is /usr/local/share/ike-scan/psk-crack-dictionary.
--norteluser=<u> or -u <u>
Specify the username for Nortel Contivity cracking. This option is required when cracking pre-shared keys on Nortel Contivity / VPN
Router systems. These systems use a proprietary method to calculate the hash that includes the username. This option is only
needed when cracking Nortel format hashes, and should not be used for standard format hashes.
--bruteforce=<n> or -B <n>
Select bruteforce cracking up to <n> characters.
--charset=<s> or -c <s>
Set bruteforce character set to <s> Default is "0123456789abcdefghijklmnopqrstuvwxyz"
AUTHOR
Roy Hills <Roy.Hills@nta-monitor.com>
February 14, 2005 PSK-CRACK(1)