what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

obpasswd.txt

obpasswd.txt
Posted Aug 17, 1999

tutorial on MACCRAC and UNIX passwd file hacking.

tags | paper
systems | unix
SHA-256 | 069b8342949d257e2b997ee0ad53c8c8f193baed3cb648c6e8327e456ffdd58c

obpasswd.txt

Change Mirror Download
Ok, heres the final release of my tutotial on MACCRAC and UNIX passwd 
file hacking. I've included some information on password shadowing since
I remembered some people asking about it. This file (like all my files)
is over simplified. I did this for people (like me) who are unfamiliar
with the intricacies or mechanics of UNIX. For more experienced users,
pleae bear with it...or, actually don't even read it. It's nothing new
to you anywya. I'd like to thank Disorder, Voyager, and the rest of TNo
for their assistance. See ya online.

oleBuzzard


---------------------------------17722322595643
Content-Transfer-Encoding: 7bit
Content-Type: text/plain

Note: To be viewed with a Monospaced, 9-point Font (i.e. Monaco, Courier)

-----------------------------------------------------------------------------
#### #### ##### ##### ##### ###### ##### ##### DOCUMENTATION
### ### ### ### ### ### ### ### ### ### ### ### ### ### ### by oleBuzzard
### ### ### ### ### ### ### ### ### ### ### ### ### ### ###
### ### ### ### ### ### ### ### ### ### ### ### %%% % %%
### ### ### ####### ### ### ###### ####### ### % %% %% % %
### ### ### ### ### ### ### ### ### ### ### ### ### ### ### % % % % %%%%
### ### ### ### ### ### ### ### ### ### ### ### ### ### ### %% % % % %
### ### ### ### ### ##### ##### ### ### ### ### ##### %%% % %%% % %
-[01-29-96]------------------------------------------------------------------


INTRODUCTION

FINALLY! A half-way decent UNIX 'passwd' cracker for the Macintosh. MACCRAC
is a very well ported version of one of the PC world's best 'passwd'
Crackers, CRACK V4.1. MACCRAC is great if you know how to use it, AND, more
importantly, if you know what UNIX password cracking is about in the first
place. Unfortunatley, the Mac underground have been SO long deprived of a
decent UNIX passwd cracker, alot of us are quite a bit behind in the
concept. That's what this tutorial is provided for. Hopefully after reading
it, not only will you have an understanding of how to use MACCRAC, but also
an increased understanding of what UNIX hacking is about in the first place.


PURPOSE OF CRACKING THE passwd

Traditionally stated, the purpose of hacking a UNIX is: to "get to ROOT."
This refers to the ROOT account that every UNIX system has as part of it's
Operating system. The ROOT is a 'Trusted User' account, THE most powerful
account on a UNIX. If you can hack a ROOT you can utilize or exploit every
function a UNIX is capable of. But to get to "ROOT" you have to have
somewhere to start. For the purposes of this file, that somewhere is with
the 'passwd' file.


WHAT'S THE passwd?

'passwd' is the common name of the file in which user account information is
stored on a UNIX system. You might consider it a comprehensive users list.
The file contains the information for an accounts USERNAME, PASSWORD, USER
NUMBER, GROUP, GECOS, HOME DIRECTORY, and SHELL. A single entry of a passwd
file entry might look like this:


PASSWORD GROUP NUMBER HOME DIRECTORY
/ / /
/ / /
kbahadur:8d34jSjs73hsb:2162:15:Ken Bahadur:/usr/users/kbahadur:/usr/bin/ksh
\ \ \ \
\ \ \ \
USERNAME USER NUMBER GECOS INFORMATION SHELL


Now take a look at the PASSWORD in this entry: 8d34jSjs73hsb. This is, in
fact, NOT the password. It is, instead, the encrypted equivalent TO the
password. As part of the UNIX Account Registration process, when a User
designates a password, the UNIX takes the password, and (*this is
important*) uses the other information from the account to generate an
encrypted equivalent to the actual password. Why? Because as part of the
UNIX operating system, users MUST have access to the 'passwd' file to be
able to login. But if anyone who has an account can access the 'passwd'
file, they can also see what everyone else's Password is. So, UNIX's
security against this is to encrypt the password entry for each users
account so that noone else will know what anyone elses password is.
Unfortunaley/fortunatley (depending on who you are) the algorithm UNIX uses
to perform this encryption has been known to Hackers for sometime. And so if
you can see this:

encrypted equivalent of pasword
/
kbahadur:8d34jSjs73hsb:2162:15:Ken Bahadur:/usr/users/kbahadur:/usr/bin/ksh

...you can use MACCRAC or any other of well over 50 'passwd' file crackers
to "guess" the password to this account entry. "Guess?" You say? "How does
that work?" It works like this:


GUESSING THE PASSWORD

First a UNIX 'passwd' file cracker takes an encrypted password equivalent
(i.e.: 8d34jSjs73hsb) from an account entry in a UNIX 'passwd' file and
holds it to be used as a Reference. From whichever account entry the
encrypted equivalent was pulled, is the particular account the 'passwd' file
cracker will attempt to crack at that time.

Next the 'passwd' file cracker goes through a process of "guessing". In this
process a single word is pulled from a Dictionary file (more on Dictionaries
later), encrypted utilizing the UNIX encryption algorithm (the one all us
hackers know about), and compared, checking to see if the derived encrypted
word matches the encrypted password equivalent used as a Reference.

If the encrypted word matches the Reference, the 'passwd' file cracker
considers it an accurate guess, it then logs the information, and moves on
to the next account. If the two do not match, the 'passwd' file cracker
pulls another word from the Dictionary file and goes through the guessing
process again. If the 'passwd' file cracker goes through every word in a
Dictionary file and never matches the Reference, the entry is skipped, and
the cracker moves on to the next account.

Now, as complicated as this may seem, it is all a relativley easy task for a
computer. As such, UNIX 'passwd' files are cracked on a regular basis. As a
result of this a number of security and other measures now (potentially)
exist to prevent unauthorized persons from accessing a UNIXes'passwd' file.
This is the topic of the next section. To this point you should understand
why UNIXes are hacked (to get to ROOT) and understand a little about
'passwd' files and their role in UNIX hacking. Got it?


GOT IT, NOW WHAT?

Ok, at this point you should be ready to try and find a UNIX 'passwd' file
to crack, right? Wrong. You still have a couple of minor, requisite tasks to
perform. First, (obviously) you'll need to find a UNIX to hack. In most
cases, you've already got one in mind, but just in case you don't we'll take
a look at a few. Also, once you've found a UNIX to hack, you'll need an
account on that UNIX. There's no way to steal the 'passwd' file from a UNIX
without first having an account on it (not true, you can always get a
'passwd' file from someone else, but ignore this because I'm contradicting
myself). Once you've accomplished your requisites you can start trying to
steal the 'passwd' file.


Step 1. Finding a UNIX to Hack
------------------------------
Seeing as how you're reading this file you probably already have a UNIX in
mind. But, for the sake of clarity, heres what a common UNIX login screen
looks like:

Ultrx v4.3 (rev .44)


login:

Other UNIX machines are: System V, BSD, Xenix, and AIX. Look for these names
to be somewhere in the login screen. Knowing what type of UNIX you're using
will aid you in hacking it.

Step 2. An account to start with
--------------------------------
If you already have a UNIX account go to Step 3. If you do not already have
an account, you need to get one. Either: trade for one, trash for one, get a
legitimate one, or hack one out by hand. The first three options are
probably the easiest. You can trade for UNIX accounts on IRC channels #hack
or #phreak. You can trash for accounts in dumpsters and trashcans at most
Colleges or Universities. You can buy legitimate accounts from any one of
the rapidly increasing number of Internet Service Providers (they almost all
use UNIX). But, of coure, as well know you're a hacker, and the only hing
you wanna do is Hack an account. So be it. Here's a list of UNIX defaults.
*NOTE* These are NON-PASSWORDED accounts. They are common on System V, BSD,
Xenix, and AiX. "These defaults are included in standard setup on various
machines so the Sysadmin can log on for the first time." In some instances,
negligent Admins will forget to change or delete these accounts. If so,
you've got an account to start with. Remember, these are NON-PASSWORDED so
if they work you shouldn't be prompted for a password. If a password is
prompted for, try using the Account name for the password as well.

[Stolen from CoTNo #01]

root bin adm
makefsys sysadm sys
mountfsys rje sync
umountfsys tty nobody
checkfsys somebody setup
lp powerdown ingres
dptp general guest
daemon gsa user
trouble games help
nuucp public unix
uucp test admin
student standard pub
field demo batch
visitor listen network
uuhelp usenet sysinfo
cron console sysbin
who root2 startup
shutdown ncrm new

Step 3. Stealing the passwd file
--------------------------------
Once you've got your UNIX accpunt you can ATTEMPT to steal the 'passwd' file
from it. I emphasize ATTEMPT because the 'passwd' file can be protected in a
number of ways, or located in a number of different places. We will explore
some common methods of exploiting the 'passwd' file.

-Common UNIX Hack-

This is probably THE easiest and most common UNIX hack. ogin in to your
account and try typing this at the prompt:


prompt concatenate Note on: 'booya>' is the name of the account
/ / prompts prompt on the machine I'm using in
booya> cat /etc/passwd these examples. The prompt on your
/ \ machine will be different. Also
directory filename DON'T type 'booya>' with an entry.


'cat' is short for concatenate, a command used for reading and displaying
files in standard output. '/etc' is the common directory for the password
file on older UNIXes. 'passwd' is the common password filename on UNIXes. If
you entered: cat /etc/passwd and got a listing that looks like this
(abbreviated):

kbahadur:IS3fhZdWX3JGU:2162:15:Ken Bahadur:/usr/users/kbahadur:/usr/bin/ksh
\
password intact

...then congrats! You've succesfully listed out (stolen) your first 'passwd'
file. *Buffer* the entire contents to a text file, save it and jump down to
the section: MACCRAC-ING.

If you got a listing that looks like this:

password tokenized
/
intruder:x:263:200:Jack Harmon:/usr/users/intruder:/bin/csh

or:

esvogt:PASSWORD HERE:2183:129:Novel,,,:/usr/users/advisor/esvogt:/usr/bin/ksh
\
password removed

or you got:

cat: cannot open /etc/passwd

Then the UNIX you are on is utilizing some other form of protection or may
be using a different 'passwd'-ing process. Keep reading.

-AIX-

On AIX systems, an UNIX variation, the 'passwd' file is in a different
place. On an AIX type:

booya> cat /etc/security/passwd

If this lists out a 'passwd' file with the (encrypted) password intact, then
you've succesfully listed out (stolen) your first 'passwd' file. *Buffer*
the entire contents to a text file and save it, and jump down to MACCRAC-
ING. If not, keep reading.

-NIS/yp-

Some UNIXes use a system called Yellow Pages [taken from #hack/alt.2600 FAQ
beta .013]:

"NIS (Network Information System) is the current name for what was once
known as yp (Yellow Pages). The purpose for NIS is to allow many
machines on a network to share configuration information, including
password data. NIS IS NOT DESIGNED TO PROMOTE SYSTEM SECURITY. If
your system uses NIS you will have a very short /etc/passwd file that
includes a line that looks like this:

+::0:0:::

"To view the real password type this command:"

booya> ypcat passwd

If 'ypcat' lists a password file with the (encrypted) password still intact,
*buffer* the entire contents and go on to MACCRAC-ING, if not, keep reading.

-Password Shadowing-

Some systems use what is called password shadowing [again, taken from
#hack/alt.2600 FAQ beta .013]:

"Password shadowing is a security system where the encrypted password
field of /etc/passwd is replaced with a special token and the
encrypted password is stored in a separate file which is not readable
by normal system users.

"To defeat password shadowing on many (but not all) systems, write a
program that uses successive calls to getpwent() to obtain the
password file.

"Example:

-------------------------------------------------------------CUT HERE
#include <pwd.h>
main()
{
struct passwd *p;
while(p=getpwent())
printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd,
p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell);
}
-------------------------------------------------------------CUT HERE

Now then, for those you who are unfamiliar with UNIX scripts and/or their
implementation, follow these directions:

First Copy the above script (not including the CUT HEREs) into a Text
file and save it as 'getp.c'. Next Login to your UNIX account and create a
directory called 'executables'. (At the prompt) Type:

prompt directory name
/ /
booya> mkdir executables
/
make directory

Now, use Fetch or some other FTP client to FTP into your account and
Upload 'getp.c' into the directory 'executables'. Once you've done this,
login to your account, and goto the 'executables' directory:

change directory
/
booya> cd executables

Type 'ls' to List the directory to make sure the file is there. If it is
you can attempt to compile the 'getp.c' script. Almost all UNIX boxes
have Compilers, it's just a matter of whether or not you have acces TO
the Compiler. Typically you do. at the UNIX prompt Type:

prompt compiler executable
\ / /
booya> cc -o getp.c getfile
/ \
output filename
option

If you don't get an error you should be left with a file named 'a.out'.
Type:

booya> a.out

If you get a listing with the (encrypted) password intact, *buffer* the
contents to a text file and go on to MACCRAC-ING. if not, keep readin'.

If you got an error when you tried to compile the 'getp.c' script: 'cc:
Command not found' then you either don't have that compiler or you don't
have access to it. In either case, try compiling with the GNU C Compiler:

gnu c compiler
/
booya> gcc getp.c
\
filename

Again, you should be left with a file named 'a.out'. At the UNIX prompt
type: a.out. If you get a password file with the (encrypted) password file
intact, *buffer* the entire contents and go on to MACCRAC-ING. If not, keep
reading.

-Last Resorts-

In some cases none of the above listed attacks may work. It might be because
you're running a newer version of UNIX like SunOS v5.4. Also it, may just be
that you don't have permissions to access the 'passwd' file for whatever
reason. In the case of SunOs v5.4, v5.4 doesn't have those helpful v4.1.x
bugs so well documented in the CERT Advicories. In this case your best bet
may be to go pick up a book on UNIX (so you can know what you're doing), and
then goto the Bugtraq Archives:

http://www.eecs.nwu.edu/~jmyers/bugtraq/search.html

...and do a search for 'SunOS 5.4'. Any vulnerabilities in 5.4 (or any other
system for that matter) may be found there.

In cases where you just don't have access to the 'passwd' file for whatever
reason, you might try the 'Dumb User' Hack: Login to a UNIX using whatever
account you have. Once you're logged in, at the prompt type:

change directory up 1
/
booya> cd ..
^
Note space ' ' between 'cd' and '..'

booya> ls
\
lists contents of directory accounts
/ \
1031exch dianafcr jetski91 \ mikesotto sanders
aa7bq diane jgroff \ milton saucy
aacker digna jhill \ mjwright sawgal
aardvark dillon jillk mkansgen sbarnes
acarr / ditomaso jimfinly mmadison sbray
\ /
accounts [ALL of these are accounts]

[etc...]

What this process does is give you the names of all the common accounts on
the UNIX you're on. Buffer this list and print it out. Exit the UNIX (type:
exit) and try to Hack back using these accounts with the Account name as the
password. i.e.:

UNIX(r) System V Release 4.0 (arthur)

login: jetski91
Password: jetski91 -- would not be shown
Login incorrect /
login: mkansgen /
Password: mkansgen
Last login: Sat Jan 27 12:34:31 from slip212m.vinue.net
Sun Microsystems Inc. SunOS 5.4 Generic July 1994
You have new mail.
Sat Jan 27 12:41:04 MST 1996
/usr/users/mkansgen
arthur{mkansgen}/usr/users/mkansgen%

This is the 'Dumb User' Hack. Because a user was 'dumb' enough use his
account name for his password, it was easily hacked, and now that dummy's
account is your's. If the Dumb User's account has more privileges than
yours (i.e. Permission to read the 'passwd' file), go back through the
previously described methods and attempt to get the 'passwd' file. If the
account has no greater privileges, keep the account for later trading on
#hack and try and hack another account with more privileges.

If you've tried everything and you still haven't succeed in stealing a
'passwd' file, goto bed and thank God you don't have more troubles in life.


MACCRAC-ING

At this point you should have a processable 'passwd' file. This file should
contain account entries with the encrypted password intact, and it should be
saved as a plain text file. If these are completed you can proceed with
using MACCRAC.

Now to use MACCRAC there a couple of operating mechanics to go over.
Remember MACCRAC is a ported version of an IBM program, and since this is a
BETA, its still a little buggy, and frills free. Basically, there are four
main components of MACCRAC:

MacCrac.FAT--This is the main MacCrac application which processes
and crack's UNIX 'passwd' files.

MacCrac.Log--This is the file where all information generated during the
process off cracking a UNIX 'passwd' file is stored.

DICTIONARY--This is a dictionary file containing words MACCRAC will use
to try and crack a 'passwd' file.

passwd--This the file that contains the UNIX account information.


Important notes on the above:

MacCrac.FAT
-----------
MACCRAC REQUIRES that ALL FILENAMES MUST BE AS THEY ARE LISTED ABOVE! There
will be no dialogs to ask you which DICTIONARY or 'passwd' file you wish to
use. MACCRAC Will look ONLY for a Dictionary file called DICTIONARY and a
UNIX 'passwd' called passwd, AND it will only look for them in the immediate
folder it is in, so make sure these files are in the same folder with
MACCRAC.

Dictionary
----------
The DICTIONARY is a standard Word Processing Dictionary as used by say,
Microsoft Word. MACCRAC's Dictionary is somewhat larger than most Word
Processoing Dictionaries with a size 2,431k. But other than it's size, it's
no different. Dictionary files consist of alphabetized words with one word
per line (carriage return) and no spaces. Heres a short sample of a
DICTIONARY file:

A
a
aa
aal
aalii
aam
Aani
aardvark
aardwolf

Now, at 2,413k, MACCRAC's Dictionary is fairly large...although certainly
not the largest. I personally have seen Dictionary files as large as 4
gigabytes! But normally you won't need a Dictionary that big. In fact the
DICTIONARY file that comes with MACCRAC should be more than adequate. But if
you would like to use a larger Dictionary or would like to use a Dictionary
of say, Foreign Words, or Star Trek Terms, or Dog Names, then you can either
make them or, find them on the internet.

In using these Dictionary files, it's important to remember that what ever
name they're called when you find them, they MUST be RENAMED to DICTIONARY,
and placed in the same Folder as MACCRAC in order to be used. If the
Dictionary file is not called DICTIONARY, or is not in the same Folder as
MACCRAC, it will not/cannot be used.

As a final note on Dictionaries, there is a program called 'Word List
Maker'. This is a Drag&Drop program which allows you to Drag two or more
Dictionary files on to it, and it will combine them into a single Dictionary
AND delete all duplicate entries. This is great for making custom, or more
extensive DICTIONARY files for MACCRAC to use. Keep in mind though, that the
larger the Dictionary, the slower the process.

passwd
------
Well the 'passwd' file is what we spent the majority of this Tutorial
discussing, so I shouldn't need to go into it much here. The most important
thing to say about the 'passwd' file at THIS point is that included with
MACCRAC is a file called 'passwd'; DELETE IT! This is just a sample file
included with MACCRAC probably for Development or Testing purposes. It will
do you no good. Replace it with your newly acquired 'passwd' file, and make
sure this newly acquired file is called: passwd. Also make sure it's in the
same Folder with MACCRAC


LET'S DO IT

Well, f you have your 'passwd' file, and you have whatever Dictionay file
you're going to use, and all of the files are correctly named and placed in
the same Folder with MACCRAC, then I guess you're ready, so lets do it!

For the sake of speed, and because you won't be able to use your computer
anyway, I suggest Restarting your Mac with Exensions Off (even if you have
RamCharger or RamDoubler). Once you've restarted, Double click on the
MACCRAC icon. If this is your first time running MACCRAC, just go up to
'Crack' in the menubar and select: Start Cracking!. The first thing you'll
probably notice is that once you've started a Cracking Session you can't do
anything else. Thats because MACCRAC hogs the processor. I would suggest
starting a session around 11:00 pm and letting it run all night. By morning,
it should have cracked at least 40-50 accounts.

If for some reason you want or need to stop a session before an entire
'passwd' file is cracked, the only way to do it is with COMMAND-OPTION-ESC.
Don't worry, any cracks MACCRAC has cracked to that point will be saved.

If you've already started Cracking a 'passwd' file but had to quit, you can
pickup where you left off by going up to the 'CRACK' menubar and dragging
down to Settings. Once in Settings select 'Recover session from "Point
File"'. Now you can 'Start Cracking!' where ever you let off.


OUTRO

If you've let it run long enough, you should have passwords. At this point
you're on your way to geting to "ROOT". The topic of Hacking "root" on UNIX
has been addressed by any of a number of well written, informative and
readily available T-Philes on UNIX Hacking. At this point I suggest you
pursue them as this file will not address that topic (remember, this is a
Tutorial on MACCRAC)

I'd like to thank Disorder, Voyager and the rest of TNo Crew for their
incite and assistance. That's it for this one. Look for more oleBuzzard's T-
Philes on the World's Greatest Underground Mac Board...

oleBuzzard's 7 Macintosh/PC Underground
/<n0wledge phreak 1 PowerPC 9500-604
### ######### 9 5500+ Philez/1.2 Gigz
### ### ## ###_{_}## ###### 5 Hack/Phreak/Phraud/Anarchy
###### ## / ###\_/ ## ### ### 7 UnionNET/IIRG-Net
##### ##,(___### ## ### ### 8 Home of the UNDERGROUNDMAC
###### ## o \ \## ## ### ### 8 SCAM! Magazine Distro Site
### ### ######### ###### 2 Runnin Hermes v3.4
/ ### 8 2400-28.800 kbaud
'No Bullshit!' 8 Only like US$20/month

---------------------------------17722322595643--
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close