185:
Crack v5.0a released in 2000 did not introduce any new features, but instead concentrated on improving the code and introducing more flexibility, such as the ability to integrate other crypt() variants such as those needed to attack the
275:
Reject the word unless it is less than 8 characters long, lowercase the word, reject it if it does not contain both the letter 'i' and the letter 'o', substitute all i's for 1's, substitute all o's for 0's, and append an =
332:
All that was required for this was to provide Crack with a configuration file containing the machine names, processing power rates and flags required to build Crack on those machines and call it with the
285:
in the password file, allowing the program to use the stored names of the users in addition to the existing word lists. Crack's dictionary generation rule syntax was subsequently borrowed and extended by
144:. Muffett found that by re-engineering the memory management, he got a noticeable performance increase. This led to a total rewrite which became Crack v2.0 and further development to improve usability.
260:
tools simply fed a pre-existing dictionary of words through the crypt() function, Crack v4.0a introduced the ability to apply rules to this word list to generate modified versions of these word lists.
841:
896:
889:
983:
869:
798:
721:
636:
602:
522:
463:
422:
114:. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation as well.
988:
882:
845:
993:
129:
170:
The release of Crack v4.0a on 3 November 1991, however, introduced several new features that made it a formidable tool in the
487:
263:
These could range from the simple (do not change) to the extremely complex - the documentation gives this as an example:
41:
684:
922:
361:
306:
318:
660:
366:
171:
103:
661:"Global Information Assurance Certification Paper Global Information Assurance Certification Paper"
126:
69:
449:
226:
218:
905:
794:
788:
717:
632:
626:
598:
592:
518:
512:
459:
453:
418:
412:
351:
346:
326:
257:
111:
99:
84:
74:
821:
445:
245:
167:
but was still only really a faster version of what was already available in other packages.
157:
57:
942:
376:
297:
The dictionary generation software for Crack was subsequently reused by
Muffett to create
291:
141:
767:
742:
287:
156:
newsgroups alt.sources and alt.security on 15 July 1991. Crack v3.2a+fcrypt, posted to
710:
977:
705:
322:
241:
957:
391:
164:
118:
30:
571:
738:
356:
282:
234:
763:
947:
381:
199:
133:
25:
874:
546:
932:
152:
The first public release of Crack was version 2.7a, which was posted to the
952:
386:
107:
325:
workstations connected by a shared filesystem as parts of a distributed
937:
371:
298:
927:
302:
153:
230:
195:
222:
191:
161:
122:
96:
62:
878:
625:
Simson
Garfinkel; Gene Spafford; Alan Schwartz (17 May 2011).
187:
301:, a proactive password checking library that is bundled with
594:
Innocent code: a security wake-up call for Web programmers
455:
Firewalls and
Internet security: repelling the wily hacker
160:
on 23 August 1991, introduced an optimised version of the
969:
492:
Proceedings of the Sixth USENIX UNIX Security
Symposium
321:
Crack v4.0a introduced the ability to use a network of
411:
David R. Mirza Ahmad; Ryan
Russell (25 April 2002).
229:
for using Crack on the password file of a system at
80:
68:
56:
40:
24:
709:
685:"Randal Schwartz's Charges Expunged - Slashdot"
458:. Addison-Wesley Professional. pp. 129–.
890:
233:, a case the verdict of which was eventually
8:
870:Password cracking - A quick guide to success
19:
897:
883:
875:
790:Automating system administration with Perl
18:
764:"John the Ripper - wordlist rules syntax"
597:. John Wiley & Sons. pp. 148–.
547:"Crypticide I: Thirteen Years of Crack"
403:
202:systems. It also bundled Crack v6 - a
793:. O'Reilly Media, Inc. pp. 461–.
787:David N. Blank-Edelman (21 May 2009).
631:. O'Reilly Media, Inc. pp. 608–.
313:Network distributed password cracking
214:Legal issues arising from using Crack
181:Network distributed password cracking
7:
628:Practical UNIX and Internet Security
488:"Murphy's law and computer security"
190:password hashes used on more modern
317:As password cracking is inherently
281:These rules could also process the
591:Sverre H. Huseby (15 March 2004).
517:. Sams Publishing. pp. 269–.
106:to locate users who may have weak
14:
252:Programmable dictionary generator
178:Programmable dictionary generator
667:(PDF), SANS Institute, p. 5
309:-derived Linux distributions.
984:Unix security-related software
708:(2011). "Here comes the Sun".
545:Muffett, Alec (15 July 2004).
16:Unix password-cracking program
1:
842:"CrackLib Enhancement Update"
659:Hakim, Anthony (2004-10-10),
486:Venema, Wietse (1996-07-01).
225:programming expert, in 1995
208:brute force password cracker
125:system administrator at the
739:"John the Ripper - credits"
665:Intel v. Randal L. Schwartz
417:. Syngress. pp. 181–.
204:minimalist password cracker
1010:
989:Password cracking software
414:Hack proofing your network
102:program designed to allow
913:
452:; Aviel D. Rubin (2003).
117:Crack began in 1990 when
52:
36:
307:Red Hat Enterprise Linux
132:, was trying to improve
994:Linux security software
822:"Debian Package Search"
319:embarrassingly parallel
240:Crack was also used by
47:5.0a / June, 2000
268:X<8l/i/olsi1so0$ =
104:system administrators
172:system administrator
446:William R. Cheswick
127:University of Wales
21:
712:Ghost in the Wires
511:Anonymous (2003).
450:Steven M. Bellovin
256:While traditional
244:when hacking into
219:Randal L. Schwartz
85:www.crypticide.com
966:
965:
906:Password cracking
800:978-0-596-00639-6
762:Designer, Solar.
737:Designer, Solar.
723:978-0-316-03770-9
716:. Little, Brown.
638:978-1-4493-1012-7
604:978-0-470-85744-1
524:978-0-672-32459-8
465:978-0-201-63466-2
424:978-1-928994-70-1
352:Password cracking
347:Computer security
327:password cracking
258:password cracking
206:and Crack v7 - a
158:comp.sources.misc
112:dictionary attack
100:password cracking
90:
89:
75:password cracking
1001:
899:
892:
885:
876:
857:
856:
854:
853:
844:. Archived from
838:
832:
831:
829:
828:
818:
812:
811:
809:
807:
784:
778:
777:
775:
774:
759:
753:
752:
750:
749:
734:
728:
727:
715:
702:
696:
695:
693:
692:
681:
675:
674:
673:
672:
656:
650:
649:
647:
645:
622:
616:
615:
613:
611:
588:
582:
581:
579:
578:
567:
561:
560:
558:
557:
542:
536:
535:
533:
531:
514:Maximum security
508:
502:
501:
499:
498:
483:
477:
476:
474:
472:
442:
436:
435:
433:
431:
408:
246:Sun Microsystems
165:crypt() function
110:vulnerable to a
58:Operating system
22:
1009:
1008:
1004:
1003:
1002:
1000:
999:
998:
974:
973:
967:
962:
943:John the Ripper
909:
903:
866:
861:
860:
851:
849:
840:
839:
835:
826:
824:
820:
819:
815:
805:
803:
801:
786:
785:
781:
772:
770:
761:
760:
756:
747:
745:
736:
735:
731:
724:
704:
703:
699:
690:
688:
683:
682:
678:
670:
668:
658:
657:
653:
643:
641:
639:
624:
623:
619:
609:
607:
605:
590:
589:
585:
576:
574:
570:Muffett, Alec.
569:
568:
564:
555:
553:
544:
543:
539:
529:
527:
525:
510:
509:
505:
496:
494:
485:
484:
480:
470:
468:
466:
444:
443:
439:
429:
427:
425:
410:
409:
405:
400:
377:John the Ripper
343:
315:
292:John the Ripper
254:
216:
150:
148:Public Releases
48:
17:
12:
11:
5:
1007:
1005:
997:
996:
991:
986:
976:
975:
964:
963:
961:
960:
955:
950:
945:
940:
935:
930:
925:
920:
914:
911:
910:
904:
902:
901:
894:
887:
879:
873:
872:
865:
864:External links
862:
859:
858:
833:
813:
799:
779:
768:Solar Designer
754:
743:Solar Designer
729:
722:
706:Mitnick, Kevin
697:
676:
651:
637:
617:
603:
583:
562:
537:
523:
503:
478:
464:
437:
423:
402:
401:
399:
396:
395:
394:
389:
384:
379:
374:
369:
364:
359:
354:
349:
342:
339:
314:
311:
288:Solar Designer
279:
278:
271:
270:
253:
250:
227:was prosecuted
215:
212:
183:
182:
179:
149:
146:
88:
87:
82:
78:
77:
72:
66:
65:
60:
54:
53:
50:
49:
46:
44:
42:Stable release
38:
37:
34:
33:
28:
15:
13:
10:
9:
6:
4:
3:
2:
1006:
995:
992:
990:
987:
985:
982:
981:
979:
972:
971:
959:
956:
954:
951:
949:
946:
944:
941:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
915:
912:
907:
900:
895:
893:
888:
886:
881:
880:
877:
871:
868:
867:
863:
848:on 2012-04-21
847:
843:
837:
834:
823:
817:
814:
802:
796:
792:
791:
783:
780:
769:
765:
758:
755:
744:
740:
733:
730:
725:
719:
714:
713:
707:
701:
698:
686:
680:
677:
666:
662:
655:
652:
640:
634:
630:
629:
621:
618:
606:
600:
596:
595:
587:
584:
573:
566:
563:
552:
548:
541:
538:
526:
520:
516:
515:
507:
504:
493:
489:
482:
479:
467:
461:
457:
456:
451:
447:
441:
438:
426:
420:
416:
415:
407:
404:
397:
393:
390:
388:
385:
383:
380:
378:
375:
373:
370:
368:
365:
363:
362:Cain and Abel
360:
358:
355:
353:
350:
348:
345:
344:
340:
338:
336:
330:
328:
324:
323:heterogeneous
320:
312:
310:
308:
304:
300:
295:
293:
289:
284:
277:
273:
272:
269:
266:
265:
264:
261:
259:
251:
249:
247:
243:
242:Kevin Mitnick
238:
236:
232:
228:
224:
220:
213:
211:
209:
205:
201:
197:
193:
189:
180:
177:
176:
175:
173:
168:
166:
163:
159:
155:
147:
145:
143:
139:
135:
131:
128:
124:
120:
115:
113:
109:
105:
101:
98:
94:
86:
83:
79:
76:
73:
71:
67:
64:
61:
59:
55:
51:
45:
43:
39:
35:
32:
29:
27:
23:
968:
958:RainbowCrack
917:
850:. Retrieved
846:the original
836:
825:. Retrieved
816:
804:. Retrieved
789:
782:
771:. Retrieved
757:
746:. Retrieved
732:
711:
700:
689:. Retrieved
687:. March 2007
679:
669:, retrieved
664:
654:
642:. Retrieved
627:
620:
608:. Retrieved
593:
586:
575:. Retrieved
572:"Crack v5.0"
565:
554:. Retrieved
550:
540:
528:. Retrieved
513:
506:
495:. Retrieved
491:
481:
469:. Retrieved
454:
440:
428:. Retrieved
413:
406:
392:RainbowCrack
334:
331:
316:
296:
280:
274:
267:
262:
255:
239:
221:, a notable
217:
207:
203:
184:
174:'s arsenal.
169:
151:
137:
119:Alec Muffett
116:
92:
91:
31:Alec Muffett
26:Developer(s)
806:17 February
644:17 February
610:17 February
530:17 February
471:17 February
430:17 February
357:Aircrack-ng
283:GECOS field
140:cracker in
130:Aberystwyth
978:Categories
948:L0phtCrack
852:2012-02-17
827:2012-02-17
773:2012-02-17
748:2012-02-17
691:2012-02-17
671:2012-02-17
577:2012-02-17
556:2012-02-17
497:2012-02-17
398:References
382:L0phtCrack
200:Windows NT
134:Dan Farmer
933:DaveGrohl
551:blog post
367:DaveGrohl
248:in 1993.
108:passwords
953:Ophcrack
908:software
387:Ophcrack
341:See also
337:option.
335:-network
329:effort.
299:CrackLib
235:expunged
938:Hashcat
372:Hashcat
81:Website
928:Chntpw
797:
720:
635:
601:
521:
462:
421:
303:Debian
154:Usenet
970:crack
918:Crack
276:sign.
231:Intel
196:Linux
95:is a
93:Crack
20:Crack
923:Cain
808:2012
795:ISBN
718:ISBN
646:2012
633:ISBN
612:2012
599:ISBN
532:2012
519:ISBN
473:2012
460:ISBN
432:2012
419:ISBN
305:and
290:for
223:Perl
198:and
192:Unix
162:Unix
142:COPS
123:Unix
121:, a
97:Unix
70:Type
63:Unix
188:MD5
138:pwc
136:'s
980::
766:.
741:.
663:,
549:.
490:.
448:;
294:.
237:.
210:.
194:,
898:e
891:t
884:v
855:.
830:.
810:.
776:.
751:.
726:.
694:.
648:.
614:.
580:.
559:.
534:.
500:.
475:.
434:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.