Just a follow up post... I haven't seen any resolution posts so far, but thought I'd get the ball rolling. And throw in a show of hands question at the end.
So we ported 400+ users from a Linux box to a Tru64 unix box last night. We acquired around 350 of the passwords using nutcracker.pl and a few very large dictionary files. We ran this against the shadow file and 3 days later got most of the passwords we needed. The problem was the other 50 that we couldn't crack. Our work around once again wasn't what I'd call ethical, but since this cutover took all night I didn't lose any sleep over it. I'll show this tool at the next meeting or whenever Ryan has me scheduled to present. We installed ethereal on the box and ran it for almost 24 hours. This is quite the packet sniffer. Using this we snagged the remaining 50 passwords by people popping their email. As most people know pop3 sends username and password in clear text. Now for my question... Is anyone using pop3s on he server side OR the new Kmail on the client side and popping mail through an ssl tunnel? Mike On Monday 18 February 2002 04:25 pm, Mike wrote: > Just curious if anyone has any dictionary or wordlist files. Here is > what's happening. We are moving some accounts from a Linux box to a Tru64 > box. Linux box does DES encryption on the password file and Tru64 does SHA > encryption. So I can't cut and paste if you will from one passwd file to > the other. Thusly I have resorted to cracking the passwd file. <INSERT > LEGAL NOTICE HERE> Yes I own this passwd file, and this is not an attempt > to break into a box. As usual we just don't want to call all 400 of these > newly aquired customers. </INSERT LEGAL NOTICE HERE>. I've already run the > /usr/share/dict files. And a the other 70-80MB of dict files I have > floating around. Also generated a few wordlist and number lists as well. > If anyone has a file that they've done well with please let me know. I > need to only crack another 117 then my part of the cut over is done. > > Thanks > Mike
