home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.hackers
- Path: sparky!uunet!haven.umd.edu!darwin.sura.net!wupost!zaphod.mps.ohio-state.edu!sol.ctr.columbia.edu!The-Star.honeywell.com!umn.edu!chaos.cs.umn.edu!bill
- From: bill@chaos.cs.umn.edu (Hari Seldon)
- Subject: Re: /etc/passwords
- Message-ID: <bill.711863712@chaos.cs.umn.edu>
- Sender: news@news2.cis.umn.edu (Usenet News Administration)
- Nntp-Posting-Host: chaos.cs.umn.edu
- Organization: University of Minnesota
- References: <Brt4nI.IFw@undergrad.math.waterloo.edu> <1992Jul22.223744.24893@news.uiowa.edu>
- Date: Thu, 23 Jul 1992 03:55:12 GMT
- Approved: ummm who? me? nahhhh
- Lines: 20
-
- In <1992Jul22.223744.24893@news.uiowa.edu> stu@hitchcock (Stuart F. Oberman) writes:
-
- >Regarding the format of the encryption scheme used by UNIX systems,
- >check the man pages on crypt. The resulting encryption is always 13
- >characters and stored either in a password file on the individual
- >machine in /etc/passwd, or in the yellow pages if using NFS
- >yellow pages. Using a ypcat will generate an equivalent file of login
- >information.
-
- >Obhack: Implementing the aforementioned trojan horse
- >scheme, where the yellow pages is consulted and password is verified
- >before it writes to a file. However, while this is (somewhat) easily
- >done, an additional challenge is to log the user in and mask your own
- >process, so that the entire event appears transparent.
- don't forget to get rid of the capturing process. wouldn't want some
- user to do a ps and see it hanging there.
-
- bill pociengel
- --
- bill@chaos.cs.umn.edu
-