Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Using Crack 5.0



On  0, Matthew J Brodeur <mbrodeur at NextTime.com> wrote:
> On 29 Nov 1999 subb3 at ibm.net wrote:
> 
> > The Crack does not try to crack my passwords. Am I invoking Crack with
> > the wrong syntax? How can I test the password qualities of my users?
> 
> 
>    Judging by the output it's working fine.  If you look at the process
> table you should see something like:
>  26709 pts/5    1:43 cracker
> 
>    Crack does some setup and then runs in the background.  You can look at
> the output with the Reporter script:
> 

I don't think any crack process is running. There is no CPU activity at all.
Nothing in xload or top. Here is my Reporter output.

$ ./Reporter -quiet
---- passwords cracked as of Mon Nov 29 12:08:02 EST 1999 ----


---- done ----

Is this invocation of Crack correct?

$ Crack -nice 10 /etc/shadow

Thank you for replying.

Subba Rao
subb3 at ibm.net
http://pws.prserv.net/truemax/
-
Subcription/unsubscription/info requests: send e-mail with
"subscribe", "unsubscribe", or "info" on the first line of the
message body to discuss-request at blu.org (Subject line is ignored).




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org