|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T y
Length: 886 (0x376) Types: TextFile Names: »yp_pass.chk«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦3da311d67⟧ »./cops/1.04/cops_104.tar.Z« └─⟦6a2577110⟧ └─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦6a2577110⟧ »./cops/1.04/cops_104.tar« └─⟦this⟧ »cops_104/yp_pass.chk«
: # # yp_pass.chk [whatever flags you want to pass to pass.chk] # # This shell script is a wrapper for the pass.chk password guessing # program for systems using Yellow Pages/NIS. All this does is dump the # yppassword file into a temp file, then runs "pass.chk" with whatever # flags were passed to it. # # Obviously, it doesn't make any sense to use the "-P" flag with # this script (which specifies an alternate password file.) # TEST=/bin/test ECHO=/bin/echo RM=/bin/rm YPCAT=/usr/bin/ypcat # Important files: yp_pass=./yp.$$ # password guessing program: pass_chk=./pass.chk # generic test to check for yp use? if $TEST -s $YPCAT ; then $YPCAT passwd > $yp_pass else $RM -f $yp_pass $ECHO Can\'t find anything to crack... exit 1 fi # crack them passwords if $TEST -s "$yp_pass" ; then $pass_chk $* -P $yp_pass fi # kill off the evidence $RM -f $yp_pass # end