1996-07-23 - Re: Decrypt Unix Password File

Header Data

From: snow <snow@smoke.suba.com>
To: “Dr.Dimitri Vulis KOTM” <dlv@bwalk.dm.com>
Message Hash: 248d8daf2cf20520b038086e4c6ef30b38fc6721523e5cb770837fa87ec43446
Message ID: <Pine.LNX.3.93.960723131530.1031B-100000@smoke.suba.com>
Reply To: <9HRiRD9w165w@bwalk.dm.com>
UTC Datetime: 1996-07-23 23:30:29 UTC
Raw Date: Wed, 24 Jul 1996 07:30:29 +0800

Raw message

From: snow <snow@smoke.suba.com>
Date: Wed, 24 Jul 1996 07:30:29 +0800
To: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Subject: Re: Decrypt Unix Password File
In-Reply-To: <9HRiRD9w165w@bwalk.dm.com>
Message-ID: <Pine.LNX.3.93.960723131530.1031B-100000@smoke.suba.com>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 23 Jul 1996, Dr.Dimitri Vulis KOTM wrote:
> Jerome Tan <jti@i-manila.com.ph> writes:
> > How can I decrypt Unix password file?
> There are many programs that do this, e.g., look for 'crack'.
> This attack can be made more difficult if you force your users not to use
> easy-to-guess passwords, and if you use something like NIS and shadowing to
> make the public part of the passwords harder to get.

     From my conversations with Mr. Tan, he seems to be a high school 
bent of mischeif. He is the one who asked about penetating firewalls, 
and now wants to know how to hack a unix passwd file. 

     Now, I am not philosophically opposed to hacking, unless you are doing
it to a machine that I am responsible for, (in which case you'd better hope
the FBI finds you before I do) but I don't think that it would be a good 
idea to just give him the information. He would wind up getting caught all 
too easily, and might point to this list as a source of information on 
cracking techniques. 

     I don't know if this should go to the whole list, so you can 
bounce it there if you think it proper.

Petro, Christopher C.
petro@suba.com <prefered for any non-list stuff>
snow@smoke.suba.com






Thread