Tip of the Trade: Cracking Passwords
Sep 09, 2008, 16:31 (0 Talkback[s])
(Other stories by Juliet Kemp)
"The first step is to extract the username/password information
from the relevant files, using the provided unshadow tool:"
Complete
Story
Related Stories:
- Trinity vs. System Rescue CD Reviewed(Aug 22, 2008)
- Crypto-Gram Newsletter, August 15, 2008(Aug 15, 2008)
- No Excuses -- Encrypt All Laptops(Jul 24, 2008)
- Tips for Your Users: Passwords You Can Live With(Jun 13, 2008)
- Disk Encryption Easily Cracked, Researchers Find(Feb 23, 2008)
- Linux.com: Point, Click, Root: System Exploitation with Open Tools(Sep 22, 2006)
- Linux.com: Detect Weak Network Passwords with Hydra(Aug 29, 2005)
- Linux.com: CLI Magic: John the Ripper(Jul 12, 2005)

