Knowledge (XXG)

Crack (password software)

Source 📝

185:
Crack v5.0a released in 2000 did not introduce any new features, but instead concentrated on improving the code and introducing more flexibility, such as the ability to integrate other crypt() variants such as those needed to attack the
275:
Reject the word unless it is less than 8 characters long, lowercase the word, reject it if it does not contain both the letter 'i' and the letter 'o', substitute all i's for 1's, substitute all o's for 0's, and append an =
332:
All that was required for this was to provide Crack with a configuration file containing the machine names, processing power rates and flags required to build Crack on those machines and call it with the
285:
in the password file, allowing the program to use the stored names of the users in addition to the existing word lists. Crack's dictionary generation rule syntax was subsequently borrowed and extended by
144:. Muffett found that by re-engineering the memory management, he got a noticeable performance increase. This led to a total rewrite which became Crack v2.0 and further development to improve usability. 260:
tools simply fed a pre-existing dictionary of words through the crypt() function, Crack v4.0a introduced the ability to apply rules to this word list to generate modified versions of these word lists.
841: 896: 889: 983: 869: 798: 721: 636: 602: 522: 463: 422: 114:. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation as well. 988: 882: 845: 993: 129: 170:
The release of Crack v4.0a on 3 November 1991, however, introduced several new features that made it a formidable tool in the
487: 263:
These could range from the simple (do not change) to the extremely complex - the documentation gives this as an example:
41: 684: 922: 361: 306: 318: 660: 366: 171: 103: 661:"Global Information Assurance Certification Paper Global Information Assurance Certification Paper" 126: 69: 449: 226: 218: 905: 794: 788: 717: 632: 626: 598: 592: 518: 512: 459: 453: 418: 412: 351: 346: 326: 257: 111: 99: 84: 74: 821: 445: 245: 167:
but was still only really a faster version of what was already available in other packages.
157: 57: 942: 376: 297:
The dictionary generation software for Crack was subsequently reused by Muffett to create
291: 141: 767: 742: 287: 156:
newsgroups alt.sources and alt.security on 15 July 1991. Crack v3.2a+fcrypt, posted to
710: 977: 705: 322: 241: 957: 391: 164: 118: 30: 571: 738: 356: 282: 234: 763: 947: 381: 199: 133: 25: 874: 546: 932: 152:
The first public release of Crack was version 2.7a, which was posted to the
952: 386: 107: 325:
workstations connected by a shared filesystem as parts of a distributed
937: 371: 298: 927: 302: 153: 230: 195: 222: 191: 161: 122: 96: 62: 878: 625:
Simson Garfinkel; Gene Spafford; Alan Schwartz (17 May 2011).
187: 301:, a proactive password checking library that is bundled with 594:
Innocent code: a security wake-up call for Web programmers
455:
Firewalls and Internet security: repelling the wily hacker
160:
on 23 August 1991, introduced an optimised version of the
969: 492:
Proceedings of the Sixth USENIX UNIX Security Symposium
321:
Crack v4.0a introduced the ability to use a network of
411:
David R. Mirza Ahmad; Ryan Russell (25 April 2002).
229:
for using Crack on the password file of a system at
80: 68: 56: 40: 24: 709: 685:"Randal Schwartz's Charges Expunged - Slashdot" 458:. Addison-Wesley Professional. pp. 129–. 890: 233:, a case the verdict of which was eventually 8: 870:Password cracking - A quick guide to success 19: 897: 883: 875: 790:Automating system administration with Perl 18: 764:"John the Ripper - wordlist rules syntax" 597:. John Wiley & Sons. pp. 148–. 547:"Crypticide I: Thirteen Years of Crack" 403: 202:systems. It also bundled Crack v6 - a 793:. O'Reilly Media, Inc. pp. 461–. 787:David N. Blank-Edelman (21 May 2009). 631:. O'Reilly Media, Inc. pp. 608–. 313:Network distributed password cracking 214:Legal issues arising from using Crack 181:Network distributed password cracking 7: 628:Practical UNIX and Internet Security 488:"Murphy's law and computer security" 190:password hashes used on more modern 317:As password cracking is inherently 281:These rules could also process the 591:Sverre H. Huseby (15 March 2004). 517:. Sams Publishing. pp. 269–. 106:to locate users who may have weak 14: 252:Programmable dictionary generator 178:Programmable dictionary generator 667:(PDF), SANS Institute, p. 5 309:-derived Linux distributions. 984:Unix security-related software 708:(2011). "Here comes the Sun". 545:Muffett, Alec (15 July 2004). 16:Unix password-cracking program 1: 842:"CrackLib Enhancement Update" 659:Hakim, Anthony (2004-10-10), 486:Venema, Wietse (1996-07-01). 225:programming expert, in 1995 208:brute force password cracker 125:system administrator at the 739:"John the Ripper - credits" 665:Intel v. Randal L. Schwartz 417:. Syngress. pp. 181–. 204:minimalist password cracker 1010: 989:Password cracking software 414:Hack proofing your network 102:program designed to allow 913: 452:; Aviel D. Rubin (2003). 117:Crack began in 1990 when 52: 36: 307:Red Hat Enterprise Linux 132:, was trying to improve 994:Linux security software 822:"Debian Package Search" 319:embarrassingly parallel 240:Crack was also used by 47:5.0a / June, 2000 268:X<8l/i/olsi1so0$ = 104:system administrators 172:system administrator 446:William R. Cheswick 127:University of Wales 21: 712:Ghost in the Wires 511:Anonymous (2003). 450:Steven M. Bellovin 256:While traditional 244:when hacking into 219:Randal L. Schwartz 85:www.crypticide.com 966: 965: 906:Password cracking 800:978-0-596-00639-6 762:Designer, Solar. 737:Designer, Solar. 723:978-0-316-03770-9 716:. Little, Brown. 638:978-1-4493-1012-7 604:978-0-470-85744-1 524:978-0-672-32459-8 465:978-0-201-63466-2 424:978-1-928994-70-1 352:Password cracking 347:Computer security 327:password cracking 258:password cracking 206:and Crack v7 - a 158:comp.sources.misc 112:dictionary attack 100:password cracking 90: 89: 75:password cracking 1001: 899: 892: 885: 876: 857: 856: 854: 853: 844:. Archived from 838: 832: 831: 829: 828: 818: 812: 811: 809: 807: 784: 778: 777: 775: 774: 759: 753: 752: 750: 749: 734: 728: 727: 715: 702: 696: 695: 693: 692: 681: 675: 674: 673: 672: 656: 650: 649: 647: 645: 622: 616: 615: 613: 611: 588: 582: 581: 579: 578: 567: 561: 560: 558: 557: 542: 536: 535: 533: 531: 514:Maximum security 508: 502: 501: 499: 498: 483: 477: 476: 474: 472: 442: 436: 435: 433: 431: 408: 246:Sun Microsystems 165:crypt() function 110:vulnerable to a 58:Operating system 22: 1009: 1008: 1004: 1003: 1002: 1000: 999: 998: 974: 973: 967: 962: 943:John the Ripper 909: 903: 866: 861: 860: 851: 849: 840: 839: 835: 826: 824: 820: 819: 815: 805: 803: 801: 786: 785: 781: 772: 770: 761: 760: 756: 747: 745: 736: 735: 731: 724: 704: 703: 699: 690: 688: 683: 682: 678: 670: 668: 658: 657: 653: 643: 641: 639: 624: 623: 619: 609: 607: 605: 590: 589: 585: 576: 574: 570:Muffett, Alec. 569: 568: 564: 555: 553: 544: 543: 539: 529: 527: 525: 510: 509: 505: 496: 494: 485: 484: 480: 470: 468: 466: 444: 443: 439: 429: 427: 425: 410: 409: 405: 400: 377:John the Ripper 343: 315: 292:John the Ripper 254: 216: 150: 148:Public Releases 48: 17: 12: 11: 5: 1007: 1005: 997: 996: 991: 986: 976: 975: 964: 963: 961: 960: 955: 950: 945: 940: 935: 930: 925: 920: 914: 911: 910: 904: 902: 901: 894: 887: 879: 873: 872: 865: 864:External links 862: 859: 858: 833: 813: 799: 779: 768:Solar Designer 754: 743:Solar Designer 729: 722: 706:Mitnick, Kevin 697: 676: 651: 637: 617: 603: 583: 562: 537: 523: 503: 478: 464: 437: 423: 402: 401: 399: 396: 395: 394: 389: 384: 379: 374: 369: 364: 359: 354: 349: 342: 339: 314: 311: 288:Solar Designer 279: 278: 271: 270: 253: 250: 227:was prosecuted 215: 212: 183: 182: 179: 149: 146: 88: 87: 82: 78: 77: 72: 66: 65: 60: 54: 53: 50: 49: 46: 44: 42:Stable release 38: 37: 34: 33: 28: 15: 13: 10: 9: 6: 4: 3: 2: 1006: 995: 992: 990: 987: 985: 982: 981: 979: 972: 971: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 915: 912: 907: 900: 895: 893: 888: 886: 881: 880: 877: 871: 868: 867: 863: 848:on 2012-04-21 847: 843: 837: 834: 823: 817: 814: 802: 796: 792: 791: 783: 780: 769: 765: 758: 755: 744: 740: 733: 730: 725: 719: 714: 713: 707: 701: 698: 686: 680: 677: 666: 662: 655: 652: 640: 634: 630: 629: 621: 618: 606: 600: 596: 595: 587: 584: 573: 566: 563: 552: 548: 541: 538: 526: 520: 516: 515: 507: 504: 493: 489: 482: 479: 467: 461: 457: 456: 451: 447: 441: 438: 426: 420: 416: 415: 407: 404: 397: 393: 390: 388: 385: 383: 380: 378: 375: 373: 370: 368: 365: 363: 362:Cain and Abel 360: 358: 355: 353: 350: 348: 345: 344: 340: 338: 336: 330: 328: 324: 323:heterogeneous 320: 312: 310: 308: 304: 300: 295: 293: 289: 284: 277: 273: 272: 269: 266: 265: 264: 261: 259: 251: 249: 247: 243: 242:Kevin Mitnick 238: 236: 232: 228: 224: 220: 213: 211: 209: 205: 201: 197: 193: 189: 180: 177: 176: 175: 173: 168: 166: 163: 159: 155: 147: 145: 143: 139: 135: 131: 128: 124: 120: 115: 113: 109: 105: 101: 98: 94: 86: 83: 79: 76: 73: 71: 67: 64: 61: 59: 55: 51: 45: 43: 39: 35: 32: 29: 27: 23: 968: 958:RainbowCrack 917: 850:. Retrieved 846:the original 836: 825:. Retrieved 816: 804:. Retrieved 789: 782: 771:. Retrieved 757: 746:. Retrieved 732: 711: 700: 689:. Retrieved 687:. March 2007 679: 669:, retrieved 664: 654: 642:. Retrieved 627: 620: 608:. Retrieved 593: 586: 575:. Retrieved 572:"Crack v5.0" 565: 554:. Retrieved 550: 540: 528:. Retrieved 513: 506: 495:. Retrieved 491: 481: 469:. Retrieved 454: 440: 428:. Retrieved 413: 406: 392:RainbowCrack 334: 331: 316: 296: 280: 274: 267: 262: 255: 239: 221:, a notable 217: 207: 203: 184: 174:'s arsenal. 169: 151: 137: 119:Alec Muffett 116: 92: 91: 31:Alec Muffett 26:Developer(s) 806:17 February 644:17 February 610:17 February 530:17 February 471:17 February 430:17 February 357:Aircrack-ng 283:GECOS field 140:cracker in 130:Aberystwyth 978:Categories 948:L0phtCrack 852:2012-02-17 827:2012-02-17 773:2012-02-17 748:2012-02-17 691:2012-02-17 671:2012-02-17 577:2012-02-17 556:2012-02-17 497:2012-02-17 398:References 382:L0phtCrack 200:Windows NT 134:Dan Farmer 933:DaveGrohl 551:blog post 367:DaveGrohl 248:in 1993. 108:passwords 953:Ophcrack 908:software 387:Ophcrack 341:See also 337:option. 335:-network 329:effort. 299:CrackLib 235:expunged 938:Hashcat 372:Hashcat 81:Website 928:Chntpw 797:  720:  635:  601:  521:  462:  421:  303:Debian 154:Usenet 970:crack 918:Crack 276:sign. 231:Intel 196:Linux 95:is a 93:Crack 20:Crack 923:Cain 808:2012 795:ISBN 718:ISBN 646:2012 633:ISBN 612:2012 599:ISBN 532:2012 519:ISBN 473:2012 460:ISBN 432:2012 419:ISBN 305:and 290:for 223:Perl 198:and 192:Unix 162:Unix 142:COPS 123:Unix 121:, a 97:Unix 70:Type 63:Unix 188:MD5 138:pwc 136:'s 980:: 766:. 741:. 663:, 549:. 490:. 448:; 294:. 237:. 210:. 194:, 898:e 891:t 884:v 855:. 830:. 810:. 776:. 751:. 726:. 694:. 648:. 614:. 580:. 559:. 534:. 500:. 475:. 434:.

Index

Developer(s)
Alec Muffett
Stable release
Operating system
Unix
Type
password cracking
www.crypticide.com
Unix
password cracking
system administrators
passwords
dictionary attack
Alec Muffett
Unix
University of Wales
Aberystwyth
Dan Farmer
COPS
Usenet
comp.sources.misc
Unix
crypt() function
system administrator
MD5
Unix
Linux
Windows NT
Randal L. Schwartz
Perl

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.