|
Message-ID: <619084.37573.qm@web54303.mail.yahoo.com> Date: Sat, 9 Dec 2006 01:02:01 -0300 (ART) From: Danett song <danett18@...oo.com.br> To: john-users@...ts.openwall.com Subject: Re: OpenUnix 8 hash format is not the normal DES? Solar Designer, Thank you for reply, I'm very happy to exchange a e-mail with you that in my opinion is a hacker legend. :) >This was briefly discussed in here before: >http://www.openwall.com/lists/john-users/2005/07/05/1 I looked at it before post, but not sure.... >Basically, there must be another file where the "real" password hash is >stored. In fact, it is likely that there's a file per user or even a directory >per user. Hummm... documentation from SCO OpenUnix say that the password files are /etc/passwd and /etc/shadow using DES. :( >Well, I think that you did not search hard enough. I don't think that >the alternate file will contain a colon after "root", or it might not >contain "root" at all (rather, "root" might be in the file or directory >name rather than inside the file). Files having the string root I looked without sucess. Any other trick for what look? >Do you have a directory called "tcb" anywhere on the system - inside >/etc or not? Yes, the /etc/security/tcb which contains the files .prv.lock, oprivs and privs. - The .prv.lock is a empity file. - The oprivs have some lines like: 19428:4010:1101314868:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/usr/bin/ln 90960:3967:1101314720:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/sbin/ln 19428:4010:1101314868:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/usr/bin/cp 90960:3967:1101314720:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/sbin/cp - The privs have some lines like: 19428:4010:1101314868:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/usr/bin/ln 90960:3967:1101314720:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/sbin/ln 19428:4010:1101314868:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/usr/bin/cp 90960:3967:1101314720:%inher,macread,macwrite,dacread,dacwrite,owner,compat,fsysrange,filesys:/sbin/cp For me it doesn't appear to be realted with password encryption. >P.S. I notice that you're using the obsolete John the Ripper 1.6, >released 8 years ago. You should want to upgrade to 1.7+ and build it >with MMX or SSE2 support (if you're on x86). Ok, I will make it, thank you for the suggestion. >Also, you did not need to use "cat" in your "grep" commands; instead >you can pass the filenames right on grep's command line. It's a old custom...hehe >-- >Alexander Peslyak >GPG key ID: 5B341F15 fp: B3FB 63F4 D7A3 BCCC 6F6E FC55 A2FC >027C 5B34 1F15 >http://www.openwall.com - bringing security into open computing >environments Cheers, Daniel --------------------------------- O Yahoo! está de cara nova. Venha conferir!
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.