HTML-version by Markus Hübner
We have seen incidents in which intruders obtain password files from sites and then try to compromise accounts by cracking passwords. Once intruders gain access to a user account, they attempt to gain root access through a cracked root password or by exploiting another vulnerability.
These incidents point to the need for system administrators to adequately defend their systems from this type of attack. We urge you to do the following.
More specifically, here are steps you can take to minimize the possibility that your password file (with passwords in it) can fall into the hands of an intruder.
1. Protect your password file.
You may wish to verify that good passwords are being selected at your site (in accordance with your organization's policies and procedures). Crack is a tool you can use to do this. It is a freely available program designed to identify standard UNIX DES encrypted passwords that can be found in widely available dictionaries by standard guessing techniques outlined in the Crack documentation.
Crack is available by anonymous FTP from
ftp://info.cert.org/pub/tools/crack
ftp://info.cert.org/pub/latest_sw_versions
ftp://ftp.stanford.edu/general/security-tools/swatch
CERT is a service mark of Carnegie Mellon University.
The CERT Coordination Center is sponsored by the Defense Advanced Research
Projects Agency (DARPA). The Software Engineering Institute is sponsored by
the U.S. Department of Defense.
Copyright 1996 Carnegie Mellon University This material may be reproduced and
distributed without permission provided it is used for noncommercial purposes
and the copyright statement is included.