The 'Thot Police'
The best defence against the Thot Police is to say something intelligent, and make your break for it while they are scratching their head, and saying, "Huh?"
Fyodor Yarochkin wrote:
Anyone has any success in breaking this? -f
I was visiting a business running SCO Xenix, and they were all aflutter over the fact that their 'root' password was fucked, and they couldn't perform any System Administration tasks. I took their SCO installation disks, used the 'find' command to find the 'passwd' file, and piped it to the editor. I blanked out the password for 'root' and rebooted the system. When logging on as root, it prompted them for a new 'root' password. By the way, do you know why a 'Back Door' is so named? It's because when someone comes in through it, and wreaks havoc, you wake up with a sore asshole. Toto "The King of Country Porno" "The World's Foremost Computer Expert" "World's Greatest Fisherman" ...and a damn good lay.
Fyodor Yarochkin writes:
Anyone has any success in breaking this? -f
Many people have tried breaking the cipher, I have not heard
of anyone being successful.
There is however a number of programs that attempt a brute-force
of passwords, the best is called 'crack' and is written by Alec Muffet.
He's just announced a new release (see below).
Crack is commonly used by system administrators to check users passwords
for easily-cracked passwords (since it's one of the first things that a hacker
breaking into your system might try, the sysadmin can get users to change
'Crack'able passwords before they're hacked).
Crack uses a set of word dictionaries that you supply, and rules
to use to permute each word (add a '1' on the end, capitalize the first
character, etc). for more attempts. It also included a re-written
version of the crypt algorithim that's faster than what comes in
many UNIXes.
Reply-To: Alec Muffett
On Thu, 26 Dec 1996, Eric Murray wrote:
Fyodor Yarochkin writes:
Anyone has any success in breaking this? -f
Many people have tried breaking the cipher, I have not heard of anyone being successful.
There is however a number of programs that attempt a brute-force of passwords, the best is called 'crack' and is written by Alec Muffet.
From Applied Cryptography (2nd edition) I got the impression that it has been cracked. Do a netsearch for "Crypt Breakers Workbench", its a freeware program that attempts to do just that.
- Lester
Mygod, please tell me you are saying this as a joke... On Thu, 26 Dec 1996, Fyodor Yarochkin wrote:
Anyone has any success in breaking this? -f
Genocide Head of the Genocide2600 Group ============================================================================ **Coming soon! www.Genocide2600.com! ____________________ *---===| |===---* *---===| Genocide |===---* "You can be a king or a street *---===| 2600 |===---* sweeper, but everyone dances with the *---===|__________________|===---* Grim Reaper." Email: gen2600@aracnet.com Web: http://www.aracnet.com/~gen2600 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ It is by caffeine alone that I set my mind in motion. It is by the Mountain Dew that the thoughts acquire speed, the lips acquire stains, the stains become a warning. It is by caffeine alone that I set my mind in motion. ================================================================================
-----BEGIN PGP SIGNED MESSAGE-----
In article
From Applied Cryptography (2nd edition) I got the impression that it has been cracked. Do a netsearch for "Crypt Breakers Workbench", its a freeware program that attempts to do just that.
Please note the difference between crypt(3), the C library call used to hash passwords, and crypt(1), the user program that encrypts files. The former is based on DES, and has not been broken (unless someone from the NSA wants to speak up now). The latter is based on the Enigma machine, and is the one that "Crypt Breakers Workbench" attacks. - Ian -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMslj2kZRiTErSPb1AQGLyQQAqzq6bWByz48dJq+hnJs+jLCqJQ+1hfI6 zZgURqMYvpFwSq4eIiHr1ukNAKP7Vrr0eHSAFalkPDn1Ii/YueY/SRRE+8oFXIho C+bJVnXpOBpjitHYpskSuGY4F5FmJrzn8U8vmlhes6viqNq00OmQANoJ0Gr+OUY4 VSHcKXwYMT4= =Anex -----END PGP SIGNATURE-----
participants (6)
-
Carl Johnson
-
Eric Murray
-
Fyodor Yarochkin
-
Genocide
-
iang@cs.berkeley.edu
-
Laszlo Vecsey