From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from minnie.tuhs.org (minnie.tuhs.org [45.79.103.53]) by inbox.vuxu.org (OpenSMTPD) with ESMTP id 6dc8a7f1 for ; Fri, 18 Oct 2019 14:34:57 +0000 (UTC) Received: by minnie.tuhs.org (Postfix, from userid 112) id 505679B63F; Sat, 19 Oct 2019 00:34:56 +1000 (AEST) Received: from minnie.tuhs.org (localhost [127.0.0.1]) by minnie.tuhs.org (Postfix) with ESMTP id BDCD39B553; Sat, 19 Oct 2019 00:34:34 +1000 (AEST) Authentication-Results: minnie.tuhs.org; dkim=pass (1024-bit key; unprotected) header.d=kilonet.net header.i=@kilonet.net header.b="PXj2J+xH"; dkim-atps=neutral Received: by minnie.tuhs.org (Postfix, from userid 112) id 136119B553; Sat, 19 Oct 2019 00:34:33 +1000 (AEST) Received: from p3plsmtpa09-04.prod.phx3.secureserver.net (p3plsmtpa09-04.prod.phx3.secureserver.net [173.201.193.233]) by minnie.tuhs.org (Postfix) with ESMTPS id 4BF4E9B552 for ; Sat, 19 Oct 2019 00:34:32 +1000 (AEST) Received: from medusa.kilonet.net ([72.69.223.115]) by :SMTPAUTH: with ESMTPA id LTKoidAjK0ncTLTKpiwM8Y; Fri, 18 Oct 2019 07:34:31 -0700 Received: from [199.89.231.101] (ender.kilonet.net [199.89.231.101]) by medusa.kilonet.net (8.14.8/8.15.1) with ESMTP id x9IEYUJQ015169; Fri, 18 Oct 2019 10:34:30 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kilonet.net; s=default; t=1571409270; bh=JvREDthxJ9GmwcDluAh3Gpza9FIW8e7dA+1/Kb14cgg=; h=Subject:To:Cc:References:From:Date:In-Reply-To; b=PXj2J+xH2j2FHS5QzPX5rXg+qBbau1zYkSfpDTjwifGLXEP4KbbYggzp92hntxjtd VsNL0YD+ec/T5bCemKP4LRldabEB7J1qWN7O1m5Cbnzi9+29EMQ+BqFg4Ud5rIT3M0 d+k8gk5gdTkRD4SQJL0mySXcRuK5v9Vu5gSe0PhY= To: Leah Neukirchen References: <1570559927.29337.for-standards-violators@oclsc.org> <2e6e1005-3bbf-5dcc-3fcc-099864c752dc@kilonet.net> <8088e5bd-3530-d3e1-8066-db6ea9389dea@kilonet.net> <3054d652-7320-a99b-df24-67001f974d39@kilonet.net> <8736g06byw.fsf@vuxu.org> From: Arthur Krewat Message-ID: <90ffe509-76b5-6629-c55a-7785815fda2e@kilonet.net> Date: Fri, 18 Oct 2019 10:34:21 -0400 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <8736g06byw.fsf@vuxu.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-CMAE-Envelope: MS4wfC3lW9dTqNVjiwQmXu+yxATCzFTtXVQD6k39qXsrDzgzeX1HLyfGfk/Xnlr7IT75RomxrNqkeTZM6HsZkuUMeKqZaudfo6Lk8yKOm/sMvqAHTgjCSrDq aK2lS/CvK0KsNVpCKeywaCYrztGUsiZArcpazFjD6rLxXjmIytEUsrHWETwICYiXfP8GN+L7QhC7lDkIdzmPdqEUAZ/pAvyJtxM= Subject: Re: [TUHS] Recovered /etc/passwd files X-BeenThere: tuhs@minnie.tuhs.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: The Unix Heritage Society mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: tuhs@minnie.tuhs.org Errors-To: tuhs-bounces@minnie.tuhs.org Sender: "TUHS" This has been solved. First attempted was a full 8-character upper/lower/numeric brute force which took over 6 days and failed. Second attempt was lower-case with control characters, and succeeded in around 40 minutes. There's a control character in it ;) Because of the outpouring of negativity about these disclosures, I am reluctant to post the actual password without the user's consent, since he's still alive. If anyone knows Bill, and can contact him, please ask for permission. This was done on three nodes of a Dell HPC cluster, each node containing two Tesla V100 nVidia GPU cards, for a total of 30720 CUDA cores. Session..........: hashcat Status...........: Running Hash.Type........: descrypt, DES (Unix), Traditional DES Hash.Target......: .2xvLVqGHJm8M Time.Started.....: Fri Oct 18 06:53:25 2019 (40 mins, 1 sec) Time.Estimated...: Fri Oct 18 08:06:55 2019 (33 mins, 29 secs) Guess.Mask.......: ?1?1?1?1?1?1?1?1 [8] Guess.Charset....: -1 lowernonprint.hcchr, -2 Undefined, -3 Undefined, -4 Undefined Guess.Queue......: 1/1 (100.00%) Speed.#2.........:  1666.0 MH/s (401.65ms) @ Accel:32 Loops:1024 Thr:256 Vec:1 Speed.#3.........:  1663.7 MH/s (402.23ms) @ Accel:32 Loops:1024 Thr:256 Vec:1 Speed.#*.........:  3329.7 MH/s Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts Progress.........: 22674229475111/29366087151182 (77.21%) Rejected.........: 0/22674229475111 (0.00%) Restore.Point....: 108847949/714924299 (15.23%) Restore.Sub.#2...: Salt:0 Amplifier:147456-148480 Iteration:0-1024 Restore.Sub.#3...: Salt:0 Amplifier:134144-135168 Iteration:0-1024 Candidates.#2....: $HEX[6e7010627170696d] -> $HEX[076710740f150509] Candidates.#3....: $HEX[0a1f676c0f150509] -> $HEX[1f710c1979060809] Hardware.Mon.#2..: Temp: 61c Util:100% Core:1380MHz Mem: 877MHz Bus:16 Hardware.Mon.#3..: Temp: 57c Util:100% Core:1380MHz Mem: 877MHz Bus:16 On 10/10/2019 8:07 AM, Leah Neukirchen wrote: > Arthur Krewat writes: > >> Oh well. Late to the party as usual ;) (time is EST, New York) >> >> -rw------- 1 ******** ***      23 Oct  9 06:09 cracked.node006.txt >> >>  $ cat cracked.node006.txt >> >> ZghOT0eRm4U9s:p/q2-q4! > I was notified Bill Joy's password does not yet appear in any list: > > bill:.2xvLVqGHJm8M:8:10:& Joy,4156424948:/usr/bill:/bin/csh >