DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T y

⟦6a7a0afb9⟧ TextFile

    Length: 886 (0x376)
    Types: TextFile
    Names: »yp_pass.chk«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦3da311d67⟧ »./cops/1.04/cops_104.tar.Z« 
        └─⟦6a2577110⟧ 
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦6a2577110⟧ »./cops/1.04/cops_104.tar« 
            └─⟦this⟧ »cops_104/yp_pass.chk« 

TextFile

:
#
#  yp_pass.chk [whatever flags you want to pass to pass.chk]
#
#   This shell script is a wrapper for the pass.chk password guessing
# program for systems using Yellow Pages/NIS.  All this does is dump the
# yppassword file into a temp file, then runs "pass.chk" with whatever
# flags were passed to it.
#
#   Obviously, it doesn't make any sense to use the "-P" flag with
# this script (which specifies an alternate password file.)
# 

TEST=/bin/test
ECHO=/bin/echo
RM=/bin/rm
YPCAT=/usr/bin/ypcat

# Important files:
yp_pass=./yp.$$

# password guessing program:
pass_chk=./pass.chk

# generic test to check for yp use?
if $TEST -s $YPCAT ; then
	$YPCAT passwd > $yp_pass
else
	$RM -f $yp_pass
	$ECHO Can\'t find anything to crack...
	exit 1
	fi

#  crack them passwords
if $TEST -s "$yp_pass" ; then	
	$pass_chk $* -P $yp_pass
	fi

# kill off the evidence
$RM -f $yp_pass

# end