Mailing List Archive
tlug.jp Mailing List tlug archive tlug Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] crack
- Date: Tue, 23 Jul 2002 17:26:18 +0900
- From: B0Ti <9915104t@example.com>
- Subject: Re: [tlug] crack
- References: <Pine.SUN.3.95.1020723153251.4842C-100000@example.com> <20020723163224.76d94e64.9915104t@example.com> <20020723165414.3307.HIYORI13@example.com>
- Organization: Kobe University, Japan
YAMAGATA Hiroo wrote: > > There is a really low chance that passwords in a company will get cracked > > by brute force. > > Brute-Force, no. Weak password checking is not for avoiding brute force. Most password cracking software uses dictionary attack then brute force. This is what I meant. Sorry about the confusion. > Someone using their initials or your extension number, or your favorite > band, or one of those easy to guess stuff, that happens all the time. But there are at least a few words to check. You must be really lucky to get in with the first guess. Otherwise heaps of messages like the one below start coming from syslog, and that's rather obvious. Jul 23 17:18:34 machine123 PAM_unix[1839]: authentication failure; user(uid=1501) -> root for su service -- B0Ti.
- Follow-Ups:
- Re: [tlug] crack
- From: Josh Glover
- References:
- [tlug] crack
- From: Nguyen Hung Vu
- Re: [tlug] crack
- From: B0Ti
- Re: [tlug] crack
- From: YAMAGATA Hiroo
Home | Main Index | Thread Index
- Prev by Date: Re: [tlug] crack
- Next by Date: [tlug] Tokyo Linux Users Group Members
- Previous by thread: Re: [tlug] crack
- Next by thread: Re: [tlug] crack
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links