/_vti_pvt/users.pwd question

From: Robert Bruce (robert.bruce@anwarcapital.com)
Date: Thu Nov 06 2003 - 17:36:11 EST


Hi all

Whilst doing an internal penetration test on our private network, I
picked up the below web file:

+ /_vti_pvt/users.pwd - these contain passwords encrypted with unix
crypt() (GET)

Upon looking in the file I get this value:

QSI8R7k5dLPOE

I put this into a passwd file and ran it against John the Ripper which
detected it as DES encrypted text. I ran DES running for over a week but
it was not able to crack this value?

Any ideas..I am doing something wrong, (PS. I ran it on a 4 CPU powerful
Compaq server).

Cheers
Robert Bruce ESA
Anwar Capital

---------------------------------------------------------------------------
Network with over 10,000 of the brightest minds in information security
at the largest, most highly-anticipated industry event of the year.
Don't miss RSA Conference 2004! Choose from over 200 class sessions and
see demos from more than 250 industry vendors. If your job touches
security, you need to be here. Learn more or register at
http://www.securityfocus.com/sponsor/RSA_pen-test_031023
and use priority code SF4.
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:42 EDT