|
Message-Id: <20060106124208.5a79c35c.rembrandt@jpberlin.de> Date: Fri, 6 Jan 2006 12:42:08 +0100 From: Rembrandt <rembrandt@...erlin.de> To: john-users@...ts.openwall.com Subject: Re: Query on John the Ripper tool -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Fri, 6 Jan 2006 16:51:52 +0530 "V, Bharath (Bharath)" <bharathv@...ent.com> wrote: > Hi, > > We are planning to use John the ripper tool to crack the passwords of our > Solaris machines. Apart from that we are also planning to use this tool for > cracking our application passwords. > Can this tool be used for cracking any applications apart from OS logins. > > Thanks > Bharath As far as the algorithm is supported (e.g. MD5) you could easily create "pseudo"-shadow-files. Just create a pseudo-user with a pseudo-shell so that it matchs the normal passwd/shadow Input. So it's just a copy/paste of the password-string. And if you're a company you may wanna donate code (Plugins with the "correct" license) or support the project with some money? The project (john) is not related to me but a company has always more power to support such projects then an individual. Kind regards, Rembrandt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (OpenBSD) iD8DBQFDvleQHXWDTKj6tTkRAgReAKCejf6mjLmpu1wkFxYBdQeaMhvVzwCglvb/ k0VoijyQ4Y1Kjz7Ys1XwZ1M= =XoGQ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.