Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 6 Jan 2006 08:31:33 -0500
From: "Mazhar" <mazhar@...oo.net>
To: <john-users@...ts.openwall.com>
Subject: Re: Query on John the Ripper tool

Hello

I was looking for a tool that can attack on remote server ... like "brute
force attack" i have this tool but i want John to make it.

Regards

Mazhar Hussain

----- Original Message ----- 
From: "Rembrandt" <rembrandt@...erlin.de>
To: <john-users@...ts.openwall.com>
Sent: Friday, January 06, 2006 6:42 AM
Subject: Re: [john-users] Query on John the Ripper tool


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Fri, 6 Jan 2006 16:51:52 +0530
> "V, Bharath (Bharath)" <bharathv@...ent.com> wrote:
>
> > Hi,
> >
> > We are planning to use John the ripper tool to crack the passwords of
our
> > Solaris machines. Apart from that we are also planning to use this tool
for
> > cracking our application passwords.
> > Can this tool be used for cracking any applications apart from OS
logins.
> >
> > Thanks
> > Bharath
>
> As far as the algorithm is supported (e.g. MD5) you could easily create
> "pseudo"-shadow-files.
>
> Just create a pseudo-user with a pseudo-shell so that it matchs the
> normal passwd/shadow Input.
> So it's just a copy/paste of the password-string.
>
> And if you're a company you may wanna donate code (Plugins with the
> "correct" license) or support the project with some money?
>
> The project (john) is not related to me but a company has always more
> power to support such projects then an individual.
>
>
> Kind regards,
> Rembrandt
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.1 (OpenBSD)
>
> iD8DBQFDvleQHXWDTKj6tTkRAgReAKCejf6mjLmpu1wkFxYBdQeaMhvVzwCglvb/
> k0VoijyQ4Y1Kjz7Ys1XwZ1M=
> =XoGQ
> -----END PGP SIGNATURE-----
>
> -- 
> To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
> to the automated confirmation request that will be sent to you.
>

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ