Thanks to all who replied. I needed to first, merge the local passwd file
with the shadow password file. After that, I ran Crack on the merged file
and cracker was running in the background.

I have also tried Jack the Ripper, which is pretty good and easy to use.

Both the programs are CPU intensive. Very CPU intensive. I have interrupted them
after a 30 hours of running. The password files are short. Some of the you
who replied had thousand+ passwords to crack. What kind of machine did you use
and for how long?

To speed up the testing, where can I find other dictionaries?

I noticed one other thing, which is about application accounts. For an application,
I create an account, which lists in the shadow file as:

xyzapp:!:21483:0:99999:4:::

The user accounts on the other hand were listed as:

user1:ukXj89DjekEYQ:21586:0:99999:8:::

Crack nor JR, tried anything on the application accounts. They tested only
the user accounts. Is it because the encrypted password existed in the 2nd
field? How does one test the integrity of the application accounts?

Thank you once again.

Subba Rao
[EMAIL PROTECTED]
http://pws.prserv.net/truemax/
http://www.smcinnovations.com

************
[EMAIL PROTECTED]   http://www.linuxchix.org

Reply via email to