|
Message-ID: <e29fd15f0803101256m38e02d19r9c077eff59692c43@mail.gmail.com> Date: Mon, 10 Mar 2008 15:56:40 -0400 From: "Travis Altman" <travisaltman@...il.com> To: john-users@...ts.openwall.com Subject: Re: How to determine # users with a shadow file RB, thanks for the good feedback. i'm trying to crack passwords for my organization (both Linux and Solaris) and I wanted to keep statistics about weak passwords. For example 5 out of 200 users had weak passwords in the first quarter and so on. i think i've got it figured out but someone tell me if i'm wrong, below is what i know about the shadow file (still need some help on items i put a "?" beside). Solaris: *LK* = locked account, NP = no password, *LK*NP=?, *LK*$1$.... = locked with password Linux: !! = locked account, !* = no password, *= ?, !!$1$.... = locked with password I'm also pretty sure that *LK*$1$... was introduced with Solaris 10, before that it would just say *LK* with no hash after. Therefore you could not unlock only reassign a new password in older version of Solaris. so i tweaked my awk script seen below. awk -F: 'length($2)==13 || length($2)==34 {print $0}' inputFile.txt | wc -l this script essentially says use ":" as a delimiter and if the 2nd field is 13 (DES) or 34 (MD5) characters then count that as a user. so it will not count what some people call a pseudo user or system user (e.g. ftp, nobody, sshd, ...). i also noticed that John will not try and crack a locked account (e.g. !!$1$xTyU.....) correct? so this script now matches the number of accounts John is trying to crack. so i guess this script is also counting the number of active accounts?
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.