This is my first try at obf^H^H^H password cracking...
So be nice.

Edit:
Since somebody added this to 'Nodes to Consider for removal and or editing' and others voted it down. I guess I have to clarify.

THIS IS NOT REALLY A PASSWORD CRACKER.

If you run it it won't jepordize your security. That was part of the obfu. It was designed to be a little different type of an obfu. It has perl trickery but also misleads you in other ways. I thought people would get it here, but I see explaination is necessary. Please read or try it before you vote...

#!/usr/local/bin/perl # Use this password cracker $orrot13=q@crey -ayr frgcjrag;pelcg($_,$p)rd$p&&cevag"$h $_"juvyr($h,$ +p)=trgcjrag'@; ${T(F)} = '/etc/passwd'; # Open up the password list and get some important accounts to try n h +ack open F,${!F* T}; $root=<F>; #1! $sync=<F>;#good $sys=<F>;$bin=<F>;$uucp=<F>;#ok # We have some decent accounts, need to try and crack them. Do another + 25 just for good measure. sub cypt; @T = <F>; for(@T[0..24]){ $T; srand; # init $gotit = crack($_,rand(999)); if($gotit){ #Show Winners print $gotit; #Say it loud and proud } # Comments are important in code. Not just for readablity, sometimes t +o make the code run right. # I wanted to take a sec andsay sorry, myspace and return stick soit i +s hard to format codenicely. $gotit =$root||$sync ||$sys||$bin||$uucp;$T=crack($gotit,rand(9)); if($T&&T(F)) { print "$gotit can be compromised!\n"; # Don't actually print the b +ad password }; }; for ("*".."@") { if (time%2 ==0) {eval $T[ord($_)];print $T[ord($_)];} else {eval $T[or +d($_)+time%3];print $uucp}; } sub T {!F}; sub F {0;} sub crack { shift @_; ($login, $passwd, $uid, $gid, $gcos, $home), $shell = split(/:/,7); shift @_; $randomnum = $_; $passwd =~ m/^(..)(.*)/; $salt = $1; $passwd = $2; if (!($randomnum == 0)) { #leave the salt unchanged } else { # Get a random salt $salt = length($randomnum)<32?chr(length($randomnum)+ 100):chr(len +gth) unless $salt; } if (cypt($salt, $login||$shell)) { $salt; # This is the salt that worked } else { 0; } } sub cypt { $salt = shift @_; $plaintext = shift @_; crypt($plaintext,$salt); }
-monkfish (the fishy monk)

In reply to Password cracker by monkfish

Title:
Use:  <p> text here (a paragraph) </p>
and:  <code> code here </code>
to format your post, it's "PerlMonks-approved HTML":



  • Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
  • Titles consisting of a single word are discouraged, and in most cases are disallowed outright.
  • Read Where should I post X? if you're not absolutely sure you're posting in the right place.
  • Please read these before you post! —
  • Posts may use any of the Perl Monks Approved HTML tags:
    a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, details, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, summary, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
  • You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.)
            For:     Use:
    & &amp;
    < &lt;
    > &gt;
    [ &#91;
    ] &#93;
  • Link using PerlMonks shortcuts! What shortcuts can I use for linking?
  • See Writeup Formatting Tips and other pages linked from there for more info.