|
Message-ID: <4255c2570803101419j264b243eg281492c95ea386d@mail.gmail.com> Date: Mon, 10 Mar 2008 15:19:27 -0600 From: RB <aoz.syn@...il.com> To: john-users@...ts.openwall.com Subject: Re: How to determine # users with a shadow file > Solaris: *LK* = locked account, NP = no password, *LK*NP=?, *LK*$1$.... = > locked with password > Linux: !! = locked account, !* = no password, *= ?, !!$1$.... = locked with > password I'm not sure about all the semantics of locking accounts and such, but you can pretty much say that if the hash field does not start with '$' and a digit, they are unable to log in with a local password. > awk -F: 'length($2)==13 || length($2)==34 {print $0}' inputFile.txt | wc -l That should work, but IMO is rather brittle. Better to do a regex match like '~ /^\$/', which should continue to work with most UNIX-used hash types. > account (e.g. !!$1$xTyU.....) correct? > so i guess this script is also counting the number of active accounts? It seems so. It would also be trivial to have a short sed script modify your offline shadow file to crack *everybody*, not just the unlocked users. If you're interested in precisely how JTR checks whether a hash is of a given type, look at 'static int valid' in *_fmt.c in the source. Spoiler: for the most part, each format tries with an initial ~3-character signature, most of which start with '$'. -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.