home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!uwm.edu!ogicse!flop.ENGR.ORST.EDU!gaia.ucs.orst.edu!skyking!stanley
- From: stanley@skyking.OCE.ORST.EDU (John Stanley)
- Newsgroups: comp.security.misc
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Message-ID: <1emrkuINNs5s@talon.UCS.ORST.EDU>
- Date: 22 Nov 92 02:35:10 GMT
- Article-I.D.: talon.1emrkuINNs5s
- Organization: Oregon State University, College of Oceanography
- Lines: 25
- NNTP-Posting-Host: skyking.oce.orst.edu
-
- In article <10013@blue.cis.pitt.edu.UUCP> nick+@pitt.edu (Nick C De Mello) writes:
- >>>They didn't explicitly say that they cracked the root password.
- >>
- >>If decrypting the passwords gave him the root password, then yes, Dave,
- >>they cracked the root password.
- >
- > Oh, come on... what do you think is more likely: these two kids
- >broke the DES encryption scheme, or the newspaper confused decrypting
- >with running the encryption on a /usr/dict/words file and greping
- >it with the /passwd file.
-
- Since both of these cases can be called "cracking" the root password,
- what is your problem?
-
- I think that it is most likely that they used something like Crack,
- which is really not the same as either one of your proposed methods.
-
- > I'll grant you they cracked the root, and thus system, but unless
- >I see some more details I'm going to be really skeptical of claims
- >they came up with the inverse DES function.
-
- My comment was in response to Dave's claim that the article didn't say
- that the kids "cracked" the root password. Nothing else. You admit
- that they cracked the password, and nobody here has claimed they
- inverted the DES algorithm. What's your problem?
-