home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cis.ohio-state.edu!news.sei.cmu.edu!drycas.club.cc.cmu.edu!pitt.edu!nick
- Newsgroups: comp.security.misc
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Message-ID: <10013@blue.cis.pitt.edu.UUCP>
- From: nick+@pitt.edu (Nick C De Mello)
- Date: 21 Nov 92 16:20:43 GMT
- Sender: news+@pitt.edu
- References: <1992Nov12.084549.5128@unix.brighton.ac.uk> <1992Nov13.195515.19232@jato.jpl.nasa.gov> <1ejjt7INNhql@talon.UCS.ORST.EDU>
- Organization: Turing Toy Factory
- Lines: 27
-
- >>>Any org. that has a _root_ password in _a_ dictionary gets all it deserves.
- >>
- >>They didn't explicitly say that they cracked the root password.
- >
- >>>filed with the charges stated. ``He then transferred the password file
- >>>to a Boeing Company computer, where he decrypted the passwords.''
- >>> That process gave Anderson the ``root'' password, which allowed
- >
- >If decrypting the passwords gave him the root password, then yes, Dave,
- >they cracked the root password.
-
- Oh, come on... what do you think is more likely: these two kids
- broke the DES encryption scheme, or the newspaper confused decrypting
- with running the encryption on a /usr/dict/words file and greping
- it with the /passwd file.
- I'll grant you they cracked the root, and thus system, but unless
- I see some more details I'm going to be really skeptical of claims
- they came up with the inverse DES function.
-
- -- Nick
-
-
- --
- _/ _/ _/ _/_/_/ _/ _/ Sea Shells to C shells, Waikiki to
- _/_/ _/ _/ _/ _/ _/_/_/ the Internet, a wave, is a wave...
- _/ _/_/ _/ _/ _/ _/
- _/ _/ _/ _/_/_/ _/ _/ CompSrv: 71232,766 * I-Net: Nick+@pitt.edu
-