|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: R T
Length: 582 (0x246)
Types: TextFile
Names: »README.yp«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦ed5edc051⟧ »./cops/1.02/cops.102.tar«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦db60b44f1⟧ »./cops/1.02/cops.102.tar.Z«
└─⟦ed5edc051⟧
└─⟦this⟧ »cops/README.yp«
There are a couple of things to keep in mind if you're using yellow pages/NIS. Automatic checks are made in the passwd.chk, group.chk, suid.chk, and ftp.chk. However, if you want to crack passwords from that database, you need to do one of three things: 1) If you're using "pass_diff.chk" to check only changed passwords (on line 108 of "cops"), change the flag on line 33 in "pass_diff.chk" from "NO" to "YES" 2) If you're not running "pass_diff.chk", replace "pass.chk" with "yp_pass.chk" on line 109 of "cops". 3) Create a file with ypcat and run "pass.chk -P file".