Регистрация Вход
Библиотека /
Поиск по библиотекеМоя библиотекаИскать книгу(обмен)

Crack v5.0 User Manual

Crack v5.0 User Manual


it was last modified on Fri Feb 14 15:50:48 1997 FTP Directory: ftp://ftp.cert.org/pub/tools/crack/ Parent Directory README . . . . . . . . . . . . . [Feb 14 20:50] 31k crack5.0.tar.gz. . . . . . . . . [Feb 14 20:44] 2896k README file from ftp://ftp.cert.org/pub/tools/crack/ ---------------------------------------------------------------------------- Crack Version v5.0 User Manual Alec Muffett (alecm@crypto.dircon.co.uk) The above address is correct as of December 1996 - if you are reading this text significantly after that date, double-check the address before sending e-mail. Discussion of issues relating to running this version of Crack should be directed to the newsgroup "comp.security.unix" - mention "Crack5" in the subject line. ----------------------------------------------------------------------------

What is Crack?


If you are unfamiliar with the concept, Crack is a password guessing program that is designed to quickly locate insecurities in Unix (or other) password files by scanning the contents of a password file, looking for users who have misguidedly chosen a weak login password. See the appendix from the previous version for more details. ----------------------------------------------------------------------------

New features.


* Complete restructuring - uses less memory * Ships with Eric Young's "libdes" as standard * API for ease of integration with arbitrary crypt() functions * API for ease of integration with arbitrary passwd file format * Considerably better gecos-field checking * More powerful rule sets * Ability to read dictionaries generated by external commands * Better recovery mechanisms for jobs interrupted by crashes * Easier to control (eg: to put to sleep during working hours) * Bundled with Crack6 (minimalist password cracker) * Bundled with Crack7 (brute force password cracker) * Tested on Solaris, Linux, FreeBSD, NetBSD, OSF and Ultrix ----------------------------------------------------------------------------

Requirements.


* Unix-like operating system. * C Compiler. * Moderate amount of disk space. * Lots of CPU time. * PERMISSION FROM YOUR SYSADMIN. * Root-privileges, quite possibly. * "gzip" is extremely desirable. * "perl", if networking/multiprocessing. ----------------------------------------------------------------------------

Configuring Crack.


* Unpack the Crack distribution. * Edit the "Crack" script, configuring the values of CRACK_PATH, C5FLAGS, CC, CFLAGS and LIBS to suit your operating system * Does your system use the traditional crypt() function to encipher its passwords? If not, then you should skip down a few sections to read "Formats and other Password Systems"; this could be the case if you are using NetBSD, FreeBSD, some versions of Digital Unix, Ultrix and OSF, etc. All users should read this section, however it is most pertinent to FreeBSD/NetBSD and OSF users, now. * If you your system does use the traditional crypt() algorithm, change directory into "src/libdes" and set about configuring the "libdes" code so that it compiles on your system when you simply type "make". Libdes is not part of Crack - it is a fast and elegant implementation of DES which includes a very fast version of the traditional crypt() algorithm. Libdes is owned and maintained by Eric Young (of SSLeay fame) and I am grateful for his permission to include a copy of it with the Crack distribution, though I believe it has since been superseded by his SSLeay package, for which support will be provided in a future revision of Crack. Crack users should spend some time trying to optimise "libdes" for speed; read the "INSTALL" file, and work out the best flags for your compiler to build "libdes". Caveats: o The first thing you'll have to do is edit the libdes Makefiles in order that they are using the correct C compiler and flags; for instance this may or may not be "gcc". o Users on 64-bit machines such as the DEC Alpha, may wish to make use of the "DES_LONG" feature as documented in the "VERSION" file. o FreeBSD and other strictly POSIX systems may need "-DTERMIOS" instead of "-DTERMIO" in "src/libdes/Makefile"; it is not critical functionality, but "libdes" will not compile cleanly without it. o People using a recent revision of "gcc" (2.7.0 or above) generally get the best results by specifying: CFLAGS=-O4 -fomit-frame-pointer -funroll-loops ...in the "Makefile" or "Makefile.uni" (for GNU "make") as appropriate. * Change back to the "Crack" directory and do: * Crack -makeonly ...which, if all is well, should build the binaries and store them in the "run/bin" directory somewhere, after which you can move onto the next stage. If you are using Crack in network mode, in a mixed environment, I strongly recommend your going around and manually building the binaries on each machine, via "Crack -makeonly", so that there are no surprises when actually running it, and also giving you the chance to install different crypt() algorithms, tuned to your machine architecture, if you are so inclined. ----------------------------------------------------------------------------

Running Crack.


The general form to invoke Crack is: Crack [options] [-fmt format] [file ...] Once Crack has been configured, you should be able to do: Crack -makeonly ...and then: Crack -makedict Which should create and compress the dictionaries for you; if something goes wrong during this process, see the troubleshooting notes, below. At this point, if you are a Crack v4.1 user, take a copy of your Crack v4.1 "F.merged" file and place it in your "run" directory; this will preserve the information that you have previously gleaned about passwords on your network. Now, you are ready to try: Crack [filename] eg: Crack -nice 10 /etc/passwd ...where "filename" is a file that stores password entries, eg: "/etc/passwd". If you run a shadowed password system or have NIS/YP, see below. ----------------------------------------------------------------------------

Full list of Options.


-debug lets you see what the Crack script is doing. -recover used when restarting an abnormally-terminated run; suppresses rebuild of the gecos-derived dictionaries. -fgnd runs the password cracker in the foreground, with stdin, stdout and stderr attached to the usual places. -fmt format specifies the input file format. See below. -from N Starts password cracking from rule number "N"; see below -keep Prevents deletion of the temporary file used to store the password cracker's input. -mail E-Mail a warning message to anyone whose password is cracked. See "scripts/nastygram". -network Runs the password cracker in "network" mode. See below. -nice N Runs the password cracker at a reduced priority, so that other jobs can take priority over the CPU. -makeonly -makedict Used for building Crack binaries and dictionaries. See above. -kill filename -remote Internal options used to support networking. ---------------------------------------------------------------------------- Shadow Password Systems, NIS/YP and the like. If you are running NIS, the simplest way to gather some data for password cracking is to do: * ypcat passwd > ypfile * Crack [options] ypfile If your system uses "shadow" password files (SV, Solaris2, AIX, some BSD-en), then your best bet is to merge the information from the main and shadow password files back into one; two example scripts are provided to do this: * shadmrg.aix * shadmrg.sv ...and it is expected that a user who can read a shadow password file has enough expertise to modify these examples (if necessary) to suit their local password system. ----------------------------------------------------------------------------

Formats and other Password Systems.


(FreeBSD, NetBSD, Ultrix, OSF) Crack v5.0 is a relatively smart program, which is pre-programmed to expect a variety of crypt() algorithms to be available for cracking in any particular environment. Specifically, it supports "libdes" as shipped, Michael Glad's "UFC" in either of its incarnations (as "ufc" and as GNU's stdlib crypt), and it supports whatever crypt() algorithm is in your standard C library. For people who wonder about how Crack picks up which algorithm to use: the "Makefile" in the "src/util" directory calls the "mkcracker" script, which then goes hunting for directories: * $CRACK_HOME/src/libdes == eric young's libdes * $CRACK_HOME/src/ufc_crypt == ufc from USENET * $CRACK_HOME/src/crypt == ufc from GNU ...and, lacking any of these, it assumes that it should use the crypt() function from the standard C library. The "mkcracker" script then calls "make" in that directory (if one exists) and if "make" is happy (and exits without errors), "mkcracker" then recurses a call to a target embedded in src/util/Makefile. For traditional crypt() users, I ship with "libdes". If this is not what you need, remove it, and add something else. This needs more testing by me, don't be shocked if it is fragile. Libdes is usually the fastest. FreeBSD and NetBSD users: if you're using the new passwd file format but you are using the traditional crypt() algorithm, after configuring "Crack" and "libdes", you should be able to get away with doing: Crack [options] -fmt bsd /etc/master.passwd ... However, if you're using a MD5-based version of crypt(), you must first do: mv src/libdes src/libdes,orig cd src/util cp elcid.c,bsd elcid.c ...before building the Crack binaries and dictionaries. For crypt16() sufferers (such as some Ultrix, OSF and Digital Unix machines) - you should do: mv src/libdes src/libdes,orig ...and then go pick up a copy of GNU libc-crypt from a GNU ftp site (eg: prep.ai.mit.edu) - observing all cryptography export and import restrictions as appropriate - and unpack it in "src" creating a "crypt" subdirectory. Then you should: * edit src/util/elcid.c to use crypt16() (change #undef to #define) * edit same file to set the value of PLAINTEXTSIZE appropriately (16) * continue to configure and run Crack as normal (I hope). ----------------------------------------------------------------------------

Weird Password Systems.


(Novell, Kerberos Tickets, LAN-Manager, VMS) Crack v5.0 does not (as distributed) support cracking these sorts of systems, although I am aware that versions of Crack v4.1f were modified to support one or more of the above. Crack v5.0 takes a different approach; the word guesser sits between two software interfaces: * SPF (aka: spiff) - standard password format * ELCID - external library crypt interface definition ...and when Crack is invoked, it first translates whatever password file is presented to it into SPF; this is achieved by a program called "xxx2spf" (the value of "xxx" is set through the "-fmt" option to Crack, default "trad"). The SPF input is then filtered to remove data which has been cracked previously, is sorted, and then passed to the cracker, which starts generating guesses and tries them through the ELCID interface, which contains a certain amount of flexibility to support salt collisions (which are detected by the SPF translator) and parallel or vector computation. The interfaces are not well documented at the moment, but it should not prove hard to write "kerb2spf" or "uaf2spf" translators or similar, perhaps in "Perl", and then wire the appropriate hash algorithm into a ELCID stub by examining the extant code. People who seriously intend to try this are welcome to contact the author for more details. ----------------------------------------------------------------------------

Recovering from crashes and cleaning up.


If a Crack session is killed accidentally, it can be restarted with moderate efficiency by doing: mv run/Dhostname.N run/tempfilename Crack -recover -fmt spf run/tempfilename However if all you wish to do is start cracking passwords from some specific rule number, or to restart a run whilst skipping over a few rulesets, try: Crack [-recover] -from N filename ... ...where N is the number of the rule to start working from. ----------------------------------------------------------------------------

Terminating a Crack run.


If you want to bring down a Crack run cleanly, the correct command is: scripts/plaster ...and then if you want to clean up, remove scratch files and merge the feedback prior to starting a new Crack run, do: make tidy ...or variations thereof, as listed in the "Makefile". Users who merely want to put Crack to sleep temporarily are encouraged not to kill the process, but instead examine the "pauser" script, which will temporarily put Crack to sleep if a file named "GOTO-SLEEP" is created in the $CRACK_HOME directory. ----------------------------------------------------------------------------

Viewing Crack output.


Crack no longer generates human-readable output directly; instead, to see the results of a Crack run, the user should do: ./Reporter [-quiet] [-html] ...every so often, to see what passwords have been cracked, as well as view errors that have been detected in the source password files, etc. Guesses are listed chronologically, so users who wish to see incremental changes in the output as Crack continues to run over a course of days or weeks, are encouraged to wrap invocations of "Reporter" in a script with "diff". The "-quiet" option suppresses the reporting of errors in the password file (corrupt entries, etc), whilst "-html" produces output in a fairly basic HTML-readable format. ----------------------------------------------------------------------------

Viewing Crack rulesets.


Crack rules are numbered 1 to N (where N is large) on the basis of the mangling rule and which dictionary it applies to. Users can view a list of numbered rules (suitable for use with Crack's "-from" option) by doing: run/bin/ARCHITECTURE/kickdict -list ---------------------------------------------------------------------------- Configuring for out-of-hours running. Users are encouraged to examine/tweak the contents of "scripts/pauser", which can be modified to put Crack to sleep at arbitrary times of day or upon arbitrary conditions, like the number of users on a machine. ----------------------------------------------------------------------------

Getting Crack to mail users who have weak passwords.


I am still not convinced of the wisdom of mailing the fact that a user has a weak password to the user herself; after all, if it's a moribund account, this will achieve nothing, and the security hole will remain. I much prefer locking such accounts in the first place. Not to mention what happens if your mail logs are world-readable, allowing your users to work out who got sent an e-mail by the password cracker, and when... However, as some people still desire the functionality, Crack supports a "-mail" option which will invoke the "nastygram" script when a user's password is broken; the user's name will be supplied as argument to the script. For those cracking passwords in a large, multi-network environment, with password files from several hosts, I include two extra SPF converters, "tradmail2spf" and "bsdmail2spf". Choose whichever script is appropriate for your crypt algorithm, and store your passwd files in a directory: pw/hostname1 pw/hostname2 ... Then, by invoking Crack as (for example): Crack -mail -fmt tradmail pw/* ...users listed in the file "pw/hostname1" will have mails sent to "username@hostname1"; users in "pw/hostname2" will be sent mail at "username@hostname2", and so forth. ----------------------------------------------------------------------------

Configuration Files.


Apart from the contents of the "Crack" script itself, there are a number of auxiliary configuration files in Crack which the user should be aware of: * conf/dictgrps.conf Crack 5.0 supports the notion of dictionary groups - collations of words taken from a selection of raw text dictionaries (with words given, one per line) permitting the user to group her dictionaries into "most-likely", "less-likely" and "least-likely" to generate a successful password guess. Dictionary groups are named ("tagged") and specified by entries in the "dictgrps.conf" file; as distributed, the groups are tagged by numbers 1 thru 3, and this file contains filename wildcards which specify the raw dictionaries used to create each group. For instance: 1:/usr/dict/*words* dict/1/* ...specifies that dictionary group "1" is to be composed from all the words held in filenames matching the pattern /usr/dict/*words*, as well as the contents of the "dict/1" subdirectory of $CRACK_HOME. Note that there need be no actual relationship between the specific dictionary tag ("1") and the names of the files that comprise it ("dict/1/*"). * conf/dictrun.conf This file contains a set of controls for the password cracker's dictionary generation algorithm. When "Crack" starts up, in addition to creating the dictionary groups cited in "dictgrps.conf", two other dictionary groups are created: "gecos" and "gcperm". The "gecos" group contains only words directly derived from the information held in the password ("SPF") file; the "gcperm" group holds words which are mechanically created by permuting and combining parts of words held in the password file (eg: "Alec Muffett" becomes "AMuffett", "AlecM", etc). When the cracker is running, it reads the "dictrun.conf" file and works its way through a set of commands which specify how to generate guesses; entries in the configuration file look like one of: dictionary-tag:rule-filename dictionary-tag:| command-line :| command-line In the first two examples, the cracker will read the tagged dictionary group and from it will create a stream of guesses, either by taking successive mangling rules from "rule-filename" and applying them to the cited dictionary group, or by piping the dictionary group through a Unix command given in "command-line". In the third example, the cracker will read a list of guesses directly from the output generated by "command-line", until the input source is exhausted. See the "dictrun.conf" file for examples. The rule-filenames cited above are the names of files which contain "mangling" rules. These rules are macro commands, one per line, which specify patterns and actions that are applied to words from a dictionary in order to generate a series of guesses. For instance, onesuch rule: /ese3u ...will select words which contain the letter "e", replace it with the digit "3", and force the rest of the word to uppercase. For more detailed explanation and samples, see the files in the "conf" directory, and the section on rule syntax, below. * conf/globrule.conf This file contains just two mangling rules; this first is applied to all words as they are read into the dictionary generating program, and the second applied to all words as they are about to leave the dictionary program to be sorted and then used as guesses. This permits users to hard-code restrictions on the minimum and maximum length of guesses that Crack should generate, as well as any other arbitrary restrictions that should be desired. The default rule merely truncates guesses at the maximum useful size, to prevent the cracker from doing un-necessary work attempting to uses different words for guesses that are, from the computer's point of view, identical. * conf/network.conf This is the file used to configure Crack for network running; this file contains lines, each of which has several fields: host:relpow:nfsbool:rshuser:crackdir Where: o host This is the name of the host to which Crack should "rsh", in order to despatch a job. There can be several instances of the same hostname in the file, if desired, in order to dispatch more than one job to a given host (if it has more than one CPU, for instance). o relpow This is a fairly arbitrary measure of the host's power, so that Crack can divide the workload of cracking evenly according to ability. The traditional value for this field is the number of crypts/second that the host's CPU can achieve (see the test suite bundled with libdes), or some guesstimate of relative power based on your slowest machine being "1", with a fudge-factor thrown in for machines that can only do cracking out-of-hours. o nfsbool (default: "y") This should be a string, "y" or "n", specifying whether the remote host shares the "Crack" filestore with the master server from which "Crack -network" is being run. o rshuser (optional) This specifies the username to invoke for the "rsh" command when connecting to the host, if it is different from the user who is running "Crack". o crackdir (required) This specifies the path to the directory in which the "Crack" script resides, on the remote host. Once this file has been correctly configured, the user should be able to invoke "Crack -network", as below. * conf/rules. These are the files containing mangle rules, one per line, as are utilised in the "dictrun.conf" file, above; comments should be on a line of their own and begin with a "#" character, and trailing whitespace is ignored. * scripts/nastygram * scripts/pauser There are the two scripts which will probably be most tweaked by the user; "nastygram" is a script which dispatches notification of passwords being cracked to the user concerned (see elsewhere in this text for details) and will require configuration of the "mail" command to be used, and of the message text. "Pauser" is a script that the password cracker will execute sporadically (at most once per minute) which can be written so as not to exit if certain conditions exist in the operating system, eg: that it is being executed in working hours, or that there are too many users on the machine, or whatever. The "cracker" will be suspended until the "pauser" script exits, and therefore this permits the user a great deal of control over how/when "Crack" operates. ----------------------------------------------------------------------------

Troubleshooting common OS-related Problems:


* The "sort" command barfs from lack of space Crack can make quite heavy demands on space in "/tmp" when sorting password data or dictionaries, which can (on occasion) lead to overfull /tmp partitions, with all the pain which that usually causes. To obviate this problem, crack always invokes "sort" using the "crack-sort" wrapper, held in the "scripts" directory; this permits the user to tweak options on the "sort" command to make it use a different, larger area of spool space, by editing the script. * HP/UX and networking (rsh, rcp) Some operating systems (notably HP/UX) do (or did) rename the standard Berkeley "rsh" executable to "remsh". If you suffer thusly, you can supply the name of your local "rsh" command as a variable in the "Crack" script, so that Crack can dispatch networked jobs when running in "-network" mode. * Mail command in "nastygram" Users who intend to use the "-mail" option for "Crack" are reminded that they should take time to configure the "nastygram" script held in the "scripts" directory for their site, especially the body of the message that is sent, as well as the "mail" command (sometimes "Mail" or "mailx") that is used to dispatch the message. * smartcat: /usr/dict/*words*: No such file or directory This message will appear on some systems (notably FreeBSD) which do not have a "words" file, or similarly-named dictionaries, held in "/usr/dict". In the specific instance of FreeBSD I believe that the files are held in /usr/share/dict or similar. Edit the "conf/dictgrps.conf" file to remedy this. ----------------------------------------------------------------------------

Multiprocessing and Networking.


Since early versions of Crack, it has been possible to distribute the load of password cracking around hosts on a network (or among several processors on a single machine) in a manner proportional to the power of the machines at your disposal. In Crack 5.0, this functionality requires the existence of a "perl" binary on your master machine, but apart from that little has changed in essence; the user should: 1. edit "conf/network.conf" (see above) 2. run: Crack -network [other flags] filename ... ...whereupon the input will be divided into parts and distributed to the machines via "rsh", and the crackers will be invoked. If the machines are not connected via NFS (or other shared filestore) there will be a certain loss of flexibility in gathering report output, but it is still possible to do effective cracking in such a setup, so long as the flags are set in the "network.conf" file to copy the gecos-derived dictionaries to the remote host before starting the cracker; there will merely be a little more manual work required. ----------------------------------------------------------------------------

Dictionary Generation (Mangling) Rules


* noop: [space] or : (colon) The presence of a colon or space in a rule affects nothing in the output from the rule; they are permitted for reasons of clarity. * restart: * The 'restart' command - an asterisk - resets the buffer to an initial starting state; this is not actually very useful for Crack, but may be used in other applications * prepend: ^X The prepend rule affixes the character X to the beginning of the word in the buffer. * append: $X The append rule affixes the character X to the end of the word in the buffer. * dfirst: [ Deletes the first character from the word in the buffer. * dlast: ] Deletes the last character from the word in the buffer. * reverse: r Takes the word in the buffer and turns it back to front. * duplicate: d Takes the word in the buffer and appends a copy of itself. * reflect: f Takes the word in the buffer and appends a reversed copy of itself. * uppercase: u Takes the word in the buffer and forces any letters to uppercase. * lowercase: l Takes the word in the buffer and forces any letters to lowercase. * capitalise: c Takes the word in the buffer, capitalises the first character and forces any other letters to lowercase. * ncapital: C Takes the word in the buffer, lowercases the first character and forces any other letters to uppercase. * pluralise: p Takes the word in the buffer and pluralises it according to English dictionary rules. * togcase: t Swaps upper for lower-case in the word, and vice versa. * lt: N Rejects the word unless it is greater-than N characters long (see Numbering, below). * match: /X or /?C Rejects the word unless it contains character X, or a character which is a member of class C. * not: !X or !?C Rejects the word if it contains character X, or a character which is a member of class C. * mfirst: (X or (?C Rejects the word unless the first character is X, or is a member of class C. * mlast: )X or )?C Rejects the word unless the last character is X, or is a member of class C. * equals: =NX or =N?C Rejects the word unless character number N (see Numbering, below) is X, or is a member of class C. * atleast: %NX or %X?C Rejects the word unless it contains at least N instances of character X, or of members of class C. * substitute: sXY or s?CY Replaces all instances of X, or of members of class C, with character Y. * extract: xNM Extracts the substring of length M (see Numbering, below), starting from position N, from the word, and discards the rest. * overstrike: oNX Overwrites the character at position N with X; no bounds checking is done other than to ensure you won't stomp on a NUL terminator, so judicious use of > and < is advised. * insert: iNX Inserts character X at position N, shuffling all other letters rightwards. * purge: @X or @?C Remove all instances of X (or characters of class C) from the word. * snip: 'N Truncate word at length N. Character Classes These are shorthands for convenient batches of characters, which might be used in rules above. * vowels: ?v * consonants: ?c * whitespace: ?w * punctuation: ?p * symbols: ?s * lowercase: ?l * uppercase: ?u * digits: ?d * alphabetics: ?a * alphanumerics: ?x Numbering In all circumstances where a numeric argument to a rule can be applied, numbers 0..36 can be specified by using the characters "0" thru "9" and "A" thru "Z". Users may also specify lengths relative to the maximum plaintext password length as specified by their ELCID library; in this case, where "x" is the maximum plaintext length, the length x is represented by an asterisk "*", the length (x - 1) by a hyphen "-", and (x - 1) by a plus, "+". All characters in a word are numbered starting from zero, so to overstrike the first character of a word with X, you would use: o0X ...as a rule. ----------------------------------------------------------------------------

What is a weak password?


See doc/faq.txt, doc/appendix,v4.1.txt, and doc/fips181.txt. ----------------------------------------------------------------------------

How do I make Crack run multi-threaded?


See doc/threading.txt and doc/usenet-article.txt. ----------------------------------------------------------------------------

How do I run Crack under a GUI?


See doc/gui.txt. ----------------------------------------------------------------------------

How do I run Crack under DOS/Win95?


Reformat your hard-drive and install Linux, then try again. CAUTION: this process may lose data. ----------------------------------------------------------------------------

How do I run Crack under WinNT?


I have no idea, though I suspect there must be some password paradigm in use under NT to make it worthwhile; if you have enough unixy stuff on your NT machine, you might be able to hack something up, else look into installing Perl for NT and use Crack6. ----------------------------------------------------------------------------

Наша библиотека является официальным зеркалом библиотеки Максима Мошкова lib.ru

Реклама