Canonical Message
Re: UNIX
Date:2:30 am Thu Nov 16, 1995
Number:#30
From:Gus
Base:Bomb_NET BBS Discussion
To:Bilbo Baggins
Subj:Re: UNIX
BB> Well I can't say for sure on all versions, but I do know that it's BB> actually pretty easy to get the password file for SCO if you know what BB> you are looking for. There are actually two sets of user logs, the encrypt BB> file which is easy to find but nearly impossible to crack, and the shadow BB> password file, which is hard to find, but fairly easy to get into. I have BB> a buddy who knows quite a bit about this and was able to hack a unix system BB> successfully. The real problem is actually getting onto the system in the BB> first place especially if ALL the users have passwords assigned by the root one of my friends hacked a couple of unix based university systems through the net.. i think the one time he used the command ypcat which basically sends you the password file :).. GpUcS --- GEcho 1.10+ * Origin: Laboratory X -Guelph, ON- (5i9)766.1793 (2662:519/200)
Previous Next Back to Area Open Thread
Display ANSI
BB> Well I can't say for sure on all versions, but I do know that it's
BB> actually pretty easy to get the password file for SCO if you know what
BB> you are looking for. There are actually two sets of user logs, the encrypt
BB> file which is easy to find but nearly impossible to crack, and the shadow
BB> password file, which is hard to find, but fairly easy to get into. I have
BB> a buddy who knows quite a bit about this and was able to hack a unix system
BB> successfully. The real problem is actually getting onto the system in the
BB> first place especially if ALL the users have passwords assigned by the root
one of my friends hacked a couple of unix based university systems through the
net.. i think the one time he used the command ypcat which basically sends you
the password file :)..
GpUcS
--- GEcho 1.10+
* Origin: Laboratory X -Guelph, ON- (5i9)766.1793 (2662:519/200)