Pete Edwards wrote:
I broke into mine by booting sash and cat-ing the
contents of /etc/passwd to
the console, then ran the encrypted password thru john the ripper. Luckily
the password turned out to be exactly that, so j-t-r took about 0.01 seconds
to dictionary attack it.
The principle, however, is sound :)
Pete,
can you expand on what sash is? I know unix, sun, linux, well, but
never have set in
front of an SGI box, and don't recognize what "sash" is. I assume it is
maybe an
acronym for "stand alone shell" but would that come from a boot option
one would
expect to get to from a hard drive boot, or would one have to have access to
a cdrom or other, and boot that, then request the boot up?
Also why not edit directly the /etc/passwd? is there some check file
system similar
to sco's or system v's or /etc/shadow, like sun has that will go
sideways if you remove
a password string from /etc/passwd? Just wondering.
Also, a friend cautioned that these could of type "EFS" and if that is
so, be sure not
to try to mount them on linux EFS, as the type names are the same, the
system are
definitely not.
Jim