<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>John The Ripper &#8211; Graeme Robinson&#039;s blog</title>
	<atom:link href="/category/infosec/hash/crack/john-the-ripper/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>A place for my thoughts when I was starting to break into the information security feild</description>
	<lastBuildDate>Thu, 29 Nov 2012 23:59:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>
	<item>
		<title>Exploit Exercises – Nebula – Level 06</title>
		<link>/exploit-exercises-nebula-level-06/</link>
					<comments>/exploit-exercises-nebula-level-06/#respond</comments>
		
		<dc:creator><![CDATA[Graeme Robinson]]></dc:creator>
		<pubDate>Thu, 29 Nov 2012 23:59:23 +0000</pubDate>
				<category><![CDATA[Brute Force]]></category>
		<category><![CDATA[Crack]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploit Excercises]]></category>
		<category><![CDATA[Hash]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[John The Ripper]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Shell]]></category>
		<category><![CDATA[Unix]]></category>
		<guid isPermaLink="false">/?p=215</guid>

					<description><![CDATA[Even less information about this one: The flag06 account credentials came from a legacy unix system. To do this level, log in as the level06 account with the password level06 . Files for this level can be found in /home/flag06. &#8230; <a href="/exploit-exercises-nebula-level-06/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Even less information about this one:</p>
<p style="padding-left: 30px;">The flag06 account credentials came from a legacy unix system.<br />
To do this level, log in as the level06 account with the password level06 . Files for this level can be found in /home/flag06.</p>
<p>I had a good idea what I&#8217;m looking for here, an easy to crack password hash in /etc/passwd rather than in the shadow file, so:</p>
<pre lang="Bash">cat /etc/passwd | grep flag06</pre>
<p>shows me the hash is ueqwOCnSGdsuM. I need to &#8220;crack&#8221; the hash. Time to get john the ripper on the case. At this point I didn&#8217;t have any other linux machines to hand, so I went to another tty session on this one and logged in a nebula and installed john (<strong>sudo apt-get install john</strong>). Then I ran john on the password file (<strong>john /etc/passwd</strong>) and he showed me the password. I switched over to flag06 account and the password worked as expected.</p>
]]></content:encoded>
					
					<wfw:commentRss>/exploit-exercises-nebula-level-06/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>My Fiancée is Using Better Passwords Than Me!</title>
		<link>/my-fiancee-is-using-better-passwords-than-me/</link>
					<comments>/my-fiancee-is-using-better-passwords-than-me/#comments</comments>
		
		<dc:creator><![CDATA[Graeme Robinson]]></dc:creator>
		<pubDate>Mon, 17 Sep 2012 20:30:32 +0000</pubDate>
				<category><![CDATA[Brute Force]]></category>
		<category><![CDATA[Comic]]></category>
		<category><![CDATA[Crack]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[FileVault]]></category>
		<category><![CDATA[Full Disk Encryption]]></category>
		<category><![CDATA[HashCat]]></category>
		<category><![CDATA[Hotmail]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[John The Ripper]]></category>
		<category><![CDATA[OS X]]></category>
		<category><![CDATA[Password Complexity]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[XKCD]]></category>
		<guid isPermaLink="false">/?p=63</guid>

					<description><![CDATA[I upgraded my Mac laptop to OS X 10.8 Mountain Lion a few weeks ago, and at the same time I decided to turn on FileVault for (almost) full disk encryption. I&#8217;m not paranoid, but If I want to get &#8230; <a href="/my-fiancee-is-using-better-passwords-than-me/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>I upgraded my Mac laptop to OS X 10.8 Mountain Lion a few weeks ago, and at the same time I decided to turn on FileVault for (almost) full disk encryption. I&#8217;m not paranoid, but If I want to get into infosec, I should at least try to be secure myself.</p>
<p>Around the same time my fiancée had said that her Windows laptop was running slow, and then her hotmail account got compromised. I checked her laptop for anything malicious (all seemed ok) but I didn&#8217;t have time to try and find out why it was running slow right then, so I set her up with an account on my Mac laptop. I had not enforced any password policy on my Mac laptop (I&#8217;m not even sure how to do that &#8211; I&#8217;ll have to find out soon), so I asked her if she would mind telling me what password she had used because her password would be able to unlock the FileVault (almost) full disk encryption and her password could be the weak link.</p>
<p>She obviously trusts me because she told me, and I knew from experience with John The Ripper/Hascat/etc that it would easily be cracked using brute force by the proper tools in a matter of seconds because it followed a very common pattern. It turned out that her hotmail account was using a similarly simple password, so it was no great surprise that it had been compromised.</p>
<p>I explained with the help of this great XKCD comic that a password can be hard to crack, but easy to remember:<a href="http://xkcd.com/936/"><img fetchpriority="high" decoding="async" class="alignnone" title="XKCD: Password Strength" src="http://imgs.xkcd.com/comics/password_strength.png" alt="" width="740" height="601" /></a></p>
<p>She is now using a passwords around 30 characters long! This means some of her passwords are probably stronger than some of mine&#8230; I have some catching up to do!</p>
]]></content:encoded>
					
					<wfw:commentRss>/my-fiancee-is-using-better-passwords-than-me/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
