Home page logo
/

basics logo Security Basics mailing list archives

Password Cracking using Djohn
From: Nathaniel Hall <nathaniel.d.hall () gmail com>
Date: Thu, 20 Jul 2006 10:52:10 -0500

I work for an organization that currently assigns passwords to all
employees and we are moving over to user created passwords.  As part of
the move, we are wanting to implement a system that will try to brute
force the user passwords (raw-MD5) so that we can disable the account if
it is easily cracked.

That said, I have used John the Ripper and love it's abilities.  I
would, however, like to distribute the workload over two or three
systems.  The software I found to do this is Djohn which uses JtR as
it's base.  I have found the system to be a bit under documented for me.
 Has anybody used it successfully?  If so, could somebody assist me in
setting up and running the system?

-- 
Nathaniel Hall, GSEC GCFW GCIA GCIH

---------------------------------------------------------------------------
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence 
in Information Security. Our program offers unparalleled Infosec management 
education and the case study affords you unmatched consulting experience. 
Using interactive e-Learning technology, you can earn this esteemed degree, 
without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault