1 |
I use "john the ripper" to test the passwords on my machines. I created |
2 |
accounts for all those I wanted to test using the original passwords |
3 |
(all of which I know!), took a copy of the files then deleted the |
4 |
accounts. It took 17 days to bruteforce the root on one machine. Its |
5 |
now 46 days and none of the others (root or user) have cracked yet. |
6 |
Machine is a 677Mhz P3 coppermine running as my gateway (hence its up |
7 |
24/7) with john niced down to 19. |
8 |
|
9 |
moriah ~ # john -status |
10 |
guesses: 1 time: 46:04:14:17 (3) c/s: 1341 |
11 |
moriah ~ # |
12 |
|
13 |
Two questions, |
14 |
1) are there any good dictionaries for john that add to the standard |
15 |
one, and |
16 |
|
17 |
2) what other "common" password crackers are good for this purpose |
18 |
(i.e., likely to be used by the bad guys) |
19 |
|
20 |
BillK |
21 |
|
22 |
|
23 |
|
24 |
On Fri, 2005-08-26 at 16:07 +0200, Frank Schafer wrote: |
25 |
> On Fri, 2005-08-26 at 09:45 +0000, Fernando Meira wrote: |
26 |
> > On 8/26/05, Frank Schafer <frank.schafer@×××××××××.cz> wrote: |
27 |
> > IYpi3tbduwbfwm |
28 |
> > |
29 |
|
30 |
> |
31 |
-- |
32 |
William Kenworthy <billk@×××××××××.au> |
33 |
Home! |
34 |
|
35 |
-- |
36 |
gentoo-user@g.o mailing list |