home *** CD-ROM | disk | FTP | other *** search
/ Hacks & Cracks / Hacks_and_Cracks.iso / hackersclub / km / library / hack / chapter2.txt < prev    next >
Text File  |  1998-03-25  |  2KB  |  50 lines

  1. Chapter 2: Passwords
  2.  
  3. Cracking Unix passwords:
  4. Contrary to popular belief, UNIX passwords cannot be decrypted. UNIX
  5. passwords are encrypted with a one way function. The login program encrypts
  6. the text you enter at the "Password:" prompt and compares that encrypted
  7. string against the encrypted form of your password.
  8.  
  9. Password cracking software uses wordlists. Each word in the wordlist is
  10. encrypted and the results are compared to the encrypted form of the target
  11. password.
  12.  
  13. The best cracking program for UNIX passwords is currently Crack by Alec
  14. Muffett. For PC-DOS, the best package to use is currently CrackerJack.
  15.  
  16. Password Shadowing:
  17. Password shadowing is a security system where the encrypted password field
  18. of /etc/passwd is replaced with a special token and the encrypted password
  19. is stored in a separate file which is not readable by normal system users. 
  20.  
  21. To defeat password shadowing on many (but not all) systems, write a program
  22. that uses successive calls to getpwent() to obtain the password file.
  23.  
  24. Finding the shadowed password:
  25. UNIX                  Path                            Token
  26. -----------------------------------------------------------------
  27. AIX 3                 /etc/security/passwd            !
  28.                       /tcb/auth/files/[first letter   #
  29.                             of username]/[username]
  30. A/UX 3.0s             /tcb/files/auth/?/*
  31. BSD4.3-Reno           /etc/master.passwd              *
  32. ConvexOS 10           /etc/shadpw                     *
  33. ConvexOS 11           /etc/shadow                     *
  34. DG/UX                 /etc/tcb/aa/user/               *
  35. EP/IX                 /etc/shadow                     x
  36. HP-UX                 /.secure/etc/passwd             *
  37. IRIX 5                /etc/shadow                     x
  38. Linux 1.1             /etc/shadow                     *
  39. OSF/1                 /etc/passwd[.dir|.pag]          *
  40. SCO UNIX #.2.x        /tcb/auth/files/[first letter   *
  41.                             of username]/[username]
  42. SunOS4.1+c2           /etc/security/passwd.adjunct    ##username
  43. SunOS 5.0             /etc/shadow
  44.                       [optional NIS+ private secure maps/tables/whatever]
  45. System V Release 4.0  /etc/shadow                     x
  46. System V Release 4.2  /etc/security/* database
  47. Ultrix 4              /etc/auth[.dir|.pag]            *
  48. UNICOS                /etc/udb                        *
  49.  
  50.