HTML-version by Markus Hübner

We have seen incidents in which intruders obtain password files from sites and then try to compromise accounts by cracking passwords. Once intruders gain access to a user account, they attempt to gain root access through a cracked root password or by exploiting another vulnerability.

These incidents point to the need for system administrators to adequately defend their systems from this type of attack. We urge you to do the following.

  1. Protect your password file so that an intruder cannot obtain a copy of it.

  2. Ensure that good passwords are selected so that they cannot easily be cracked, or use a technology in which passwords are not located in the password file.

  3. Ensure that you are up-to-date with security patches and workarounds.

  4. Watch for unusual activity.

More specifically, here are steps you can take to minimize the possibility that your password file (with passwords in it) can fall into the hands of an intruder.


1. Protect your password file.


2. Ensure that the passwords being used on accounts cannot easily be guessed or cracked by intruders.

You may wish to verify that good passwords are being selected at your site (in accordance with your organization's policies and procedures). Crack is a tool you can use to do this. It is a freely available program designed to identify standard UNIX DES encrypted passwords that can be found in widely available dictionaries by standard guessing techniques outlined in the Crack documentation.

Crack is available by anonymous FTP from

ftp://info.cert.org/pub/tools/crack


3. Ensure that you are up-to-date with patches and workarounds on your machines.

ftp://info.cert.org/pub/latest_sw_versions


4. Watch for unusual activity.

ftp://ftp.stanford.edu/general/security-tools/swatch


Copyright 1996 Carnegie Mellon University This material may be reproduced and distributed without permission provided it is used for noncommercial purposes and the copyright statement is included.

CERT is a service mark of Carnegie Mellon University.

The CERT Coordination Center is sponsored by the Defense Advanced Research Projects Agency (DARPA). The Software Engineering Institute is sponsored by the U.S. Department of Defense.


Back to the Security-Page