These classnotes are depreciated. As of 2005, I no longer teach the classes. Notes will remain online for legacy purposes

UNIX03/Scan For Weak Passwords

Classnotes | UNIX03 | RecentChanges | Preferences

Using John the Ripper, scan your system's shadow file and see what users have weak passwords. Be sure to scan a copy of the shadow file so you don't risk ruining the original. Also be sure that the copy of the shadow file is still only readable by you so that no other user can gain access to it!

Correct any weak passwords.

After that, look through /etc/passwd and /etc/shadow and make certain that all system accounts are disabled or having passwords assigned to them.



Classnotes | UNIX03 | RecentChanges | Preferences
This page is read-only | View other revisions
Last edited May 31, 2003 3:29 am (diff)
Search:
(C) Copyright 2003 Samuel Hart
Creative Commons License
This work is licensed under a Creative Commons License.