[TUHS] Recovered /etc/passwd files

Arthur Krewat krewat at kilonet.net
Sat Oct 19 00:34:21 AEST 2019


This has been solved.

First attempted was a full 8-character upper/lower/numeric brute force 
which took over 6 days and failed.

Second attempt was lower-case with control characters, and succeeded in 
around 40 minutes.

There's a control character in it ;)

Because of the outpouring of negativity about these disclosures, I am 
reluctant to post the actual password without the user's consent, since 
he's still alive. If anyone knows Bill, and can contact him, please ask 
for permission.

This was done on three nodes of a Dell HPC cluster, each node containing 
two Tesla V100 nVidia GPU cards, for a total of 30720 CUDA cores.

Session..........: hashcat
Status...........: Running
Hash.Type........: descrypt, DES (Unix), Traditional DES
Hash.Target......: .2xvLVqGHJm8M
Time.Started.....: Fri Oct 18 06:53:25 2019 (40 mins, 1 sec)
Time.Estimated...: Fri Oct 18 08:06:55 2019 (33 mins, 29 secs)
Guess.Mask.......: ?1?1?1?1?1?1?1?1 [8]
Guess.Charset....: -1 lowernonprint.hcchr, -2 Undefined, -3 Undefined, 
-4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#2.........:  1666.0 MH/s (401.65ms) @ Accel:32 Loops:1024 Thr:256 
Vec:1
Speed.#3.........:  1663.7 MH/s (402.23ms) @ Accel:32 Loops:1024 Thr:256 
Vec:1
Speed.#*.........:  3329.7 MH/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 22674229475111/29366087151182 (77.21%)
Rejected.........: 0/22674229475111 (0.00%)
Restore.Point....: 108847949/714924299 (15.23%)
Restore.Sub.#2...: Salt:0 Amplifier:147456-148480 Iteration:0-1024
Restore.Sub.#3...: Salt:0 Amplifier:134144-135168 Iteration:0-1024
Candidates.#2....: $HEX[6e7010627170696d] -> $HEX[076710740f150509]
Candidates.#3....: $HEX[0a1f676c0f150509] -> $HEX[1f710c1979060809]
Hardware.Mon.#2..: Temp: 61c Util:100% Core:1380MHz Mem: 877MHz Bus:16
Hardware.Mon.#3..: Temp: 57c Util:100% Core:1380MHz Mem: 877MHz Bus:16




On 10/10/2019 8:07 AM, Leah Neukirchen wrote:
> Arthur Krewat <krewat at kilonet.net> writes:
>
>> Oh well. Late to the party as usual ;) (time is EST, New York)
>>
>> -rw------- 1 ******** ***      23 Oct  9 06:09 cracked.node006.txt
>>
>>   $ cat cracked.node006.txt
>>
>> ZghOT0eRm4U9s:p/q2-q4!
> I was notified Bill Joy's password does not yet appear in any list:
>
> bill:.2xvLVqGHJm8M:8:10:& Joy,4156424948:/usr/bill:/bin/csh
>



More information about the TUHS mailing list