On Mar 30, 2015, at 11:08 PM, Jegadeesh Kumar jegasm...@gmail.com wrote:
# Root password
rootpw --iscrypted $1$1SItJOAg$UM9n7lRFK1/OCs./rgQtQ/
# System authorization information
auth --useshadow --passalgo=sha512
Those two settings are inconsistent. The $1 at the beginning of that crypt(3)
On Wed, April 1, 2015 11:09 am, Andrew Holway wrote:
This is all interesting, but I've got one dumb question: why do you need
to decrypt it?
In the UK we have a law which give you the right to remain silent; so as
not to incriminate yourself. I think in the US its known as taking the
This is all interesting, but I've got one dumb question: why do you need
to decrypt it?
In the UK we have a law which give you the right to remain silent; so as
not to incriminate yourself. I think in the US its known as taking the
fifth.
___
CentOS
Warren Young wrote:
On Mar 30, 2015, at 11:08 PM, Jegadeesh Kumar jegasm...@gmail.com wrote:
# Root password
rootpw --iscrypted $1$1SItJOAg$UM9n7lRFK1/OCs./rgQtQ/
# System authorization information
auth --useshadow --passalgo=sha512
Those two settings are inconsistent. The $1 at the
On Mar 30, 2015, at 11:37 PM, Eero Volotinen eero.voloti...@iki.fi wrote:
Well, you could bruteforce sha512 hashed password or use dictionary attack
against it.
The sad thing is that dictionary attacks still work. Just a few months ago on
this very mailing list, we had a big battle over
On Wed, Apr 01, 2015 at 06:09:01PM +0200, Andrew Holway wrote:
In the UK we have a law which give you the right to remain silent; so as
not to incriminate yourself. I think in the US its known as taking the
fifth.
The UK RIPA act requires you to hand over decryption keys upon presentation
of
On Wed, 2015-04-01 at 18:09 +0200, Andrew Holway wrote:
This is all interesting, but I've got one dumb question: why do you need
to decrypt it?
In the UK we have a law which give you the right to remain silent; so as
not to incriminate yourself. I think in the US its known as taking
Valeri Galtsev wrote:
On Wed, April 1, 2015 11:09 am, Andrew Holway wrote:
This is all interesting, but I've got one dumb question: why do you
need to decrypt it?
In the UK we have a law which give you the right to remain silent; so as
not to incriminate yourself. I think in the US its
On 03/31/2015 12:08 AM, Jegadeesh Kumar wrote:
Is there any way to decry pt the password and get it as plain text.
yes. but not inexpensive.
from this group;
http://www.openwall.com/
you will find;
http://www.openwall.com/john/pro/linux/
and a shell script for using;
Hi Team,
I have the kick start file where my root password is store like
# Root password
rootpw --iscrypted $1$1SItJOAg$UM9n7lRFK1/OCs./rgQtQ/
# System authorization information
auth --useshadow --passalgo=sha512
Is there any way to decry pt the password and get it as plain text.
I know
On 03/31/2015 06:08 PM, Jegadeesh Kumar wrote:
I have the kick start file where my root password is store like
# Root password
rootpw --iscrypted $1$1SItJOAg$UM9n7lRFK1/OCs./rgQtQ/
# System authorization information
auth --useshadow --passalgo=sha512
Is there any way to decry pt the
2015-03-31 8:08 GMT+03:00 Jegadeesh Kumar jegasm...@gmail.com:
Hi Team,
I have the kick start file where my root password is store like
# Root password
rootpw --iscrypted $1$1SItJOAg$UM9n7lRFK1/OCs./rgQtQ/
# System authorization information
auth --useshadow --passalgo=sha512
Is
12 matches
Mail list logo