Author
Message
drizjr
Unfictologist
Joined: 28 Nov 2003 Posts: 1700
Shadow.txt As I was looking at the list of names from http://nru.us/physics/purge/shadow.txt
I could identify all of them from the NRU faculty list or from the story line except for this one...
Quote:
jhoover :$1$s/2.FB1 .$xHMB/Tf849j3ceCgFWWvP/:12097:0:99999:7:::
I realize that's a 1, but it looks like FBI.
J. Egar Hoover as a hopper???
Maybe an easter egg
Posted: Sun Dec 14, 2003 5:18 pm
eXt
Boot
Joined: 27 Dec 2003 Posts: 40 Location: Sweden
I'm going to try to crack some of those password to see if they might give us some info.
I don't think FB1 has anything to do with FBI, just a coincidence.
Posted: Sat Dec 27, 2003 6:18 pm
AnthraX101
Entrenched
Joined: 18 Mar 2003 Posts: 797
Several people did extensive cracking attempts on it. Those three passwords were the only ones I found with a 14.4 million hit list, using the standard hybrid settings. The only other thing that I could think of trying is a distributed brute force attack, to try unlikely combonations. (FYI: My wordlist can be found at http://s88749232.onlinehome.us/bigdict )
I don't know about FB1 being a coincidence the probability against that is astronomical. I think it's probably an egg. Perhaps it's a subtle hint that most of these are not ment to be broken?
AnthraX101
_________________VGhlcmUgaXMgbm8gc3Bvb24u
ll----ll--ll--ll----l---ll---llll---ll--l--ll---llll-ll-l-ll-llll--l-.
Posted: Sat Dec 27, 2003 6:44 pm
addlepated
Unfictologist
Joined: 17 Aug 2003 Posts: 1885 Location: Austin, Texas
eXt wrote:
I'm going to try to crack some of those password to see if they might give us some info.
Several of us ran JtR on the shadow file and only came up with Jake and Zeladzny's passwords. If you have something else to try, go for it, but I don't think that you'll find anything new with JtR.
Posted: Sat Dec 27, 2003 6:46 pm
eXt
Boot
Joined: 27 Dec 2003 Posts: 40 Location: Sweden
I'm going to assign my Linux server to it. What i'm going to do is a real bruteforce attack, and if those passwords is valid i will get them, sooner or later. But it will take time.
Posted: Sun Dec 28, 2003 6:46 am
Rasputin42x69
Decorated
Joined: 11 Oct 2003 Posts: 184 Location: Eris' Bar & Grill, Limbo
eXt wrote:
I'm going to assign my Linux server to it. What i'm going to do is a real bruteforce attack, and if those passwords is valid i will get them, sooner or later. But it will take time.
Um, I wouldn't do that; Brute Forcing like that is basically a major no-no in the ARG genere, as it eats up bandwidth like a mofo, and that costs the PMs $$$.
_________________Anyone who takes anything I say seriously deserves what they get.
The Holy Devil, out. ^_^
(Currently playing: BSeeingU - Watching: Year Zero - Played: Project MU, Acheron, Aware)
Posted: Sun Dec 28, 2003 5:07 pm
MageSteff
Pretty talky there aintcha, Talky?
Joined: 06 Jun 2003 Posts: 2716 Location: State of Denial
eXt wrote:
I'm going to assign my Linux server to it. What i'm going to do is a real bruteforce attack, and if those passwords is valid i will get them, sooner or later. But it will take time.
Eh, survey says a resounding "No."
Several reasons:
1. Resourses. If you are flooding the PM's server, the rest of us may be unable to log in, the PM's may have difficulty doing updates to the sites involved, and as mentioned by Rasputin, costs the PM's money that they may not have to spend. (Personally, I'd rather see that money spent elsewhere, wouldn't you?)
2. Not sporting behavior. There is a "gentleman's agreement" that direct brute force attacks are against all rules written or not. Using "Jack the ripper" against the text file to get the passwords was allowed/expected, but to go directly against the login site is no allowed and will make many people upset, not just the PMs but also the players who are following the rules.
3. We have two valid passwords currently and one password that no longer works. Chances are there are no more valid passwords to be found at this time, at least not by the method you propose.
4. The PMs may feel it necessary to take drastic action, to prevent the attacks which may include shutting down the site(s) involved or closing the game down. I certainly wouldn't blame them, but I also do not want to give them any reason to look at those options.
If you must do something with your time, please direct your efforts to the pictures on the Espoo poster. See if there are any stegged messages for us hidden in them. THanks.
_________________Magesteff
A small group of thoughtful people could change the world. Indeed, it's the only thing that ever has. - Margaret Mead
Posted: Sun Dec 28, 2003 7:30 pm
AnthraX101
Entrenched
Joined: 18 Mar 2003 Posts: 797
One would assume that since this is posted in a thread about Shadow.txt, he is just brute forcing the password file, and not any of the servers If he is, of course, then it's not a good idea. But it's worth a shot with the shadow file. I just doubt you are going to get anything more.
And I thought brute forcing steganography was bad Magesteff?
AnthraX101
_________________VGhlcmUgaXMgbm8gc3Bvb24u
ll----ll--ll--ll----l---ll---llll---ll--l--ll---llll-ll-l-ll-llll--l-.
Posted: Sun Dec 28, 2003 7:39 pm
eXt
Boot
Joined: 27 Dec 2003 Posts: 40 Location: Sweden
Yes, i'm bruteforcing the shadow.txt file, not the servers... i don't have anything to loose by doing it, the computer i'm using didn't do anything anyway... If there is a valid password, i think its worth getting it.
Magesteff wrote:
2. Not sporting behavior. There is a "gentleman's agreement" that direct brute force attacks are against all rules written or not. Using "Jack the ripper" against the text file to get the passwords was allowed/expected, but to go directly against the login site is no allowed and will make many people upset, not just the PMs but also the players who are following the rules.
I am using JTR, but i don't use a wordlist, but bruteforce
Posted: Sun Dec 28, 2003 9:09 pm
AnthraX101
Entrenched
Joined: 18 Mar 2003 Posts: 797
Ok, after 9 days, 25 min, and 43 seconds, I have gotten tired of my computer being so slow. I give you my resume file. This works out to somewhere around 3,428,229,200 attempts. That's a lot of processing time.
To resume my attack, use the command "john -resume:restore.txt", but your encrypted file must be named shadow.txt.
AnthraX101
EDIT: Lets realy attach the file this time.
Description
Restore file
Download
Filename
restore.txt
Filesize
87Bytes
Downloaded
113 Time(s)
_________________VGhlcmUgaXMgbm8gc3Bvb24u
ll----ll--ll--ll----l---ll---llll---ll--l--ll---llll-ll-l-ll-llll--l-.
Posted: Mon Jan 05, 2004 7:47 pm
rose
...and then Magic happens
Joined: 26 Nov 2003 Posts: 4117
A question Can we even access the log-in page now? Or should we assume that it will be back someday?
_________________I love this site for being free, in every sense of the word~Spacebass
Mankind was my business, the common good was my business.~ Dickens
Posted: Mon Jan 05, 2004 8:34 pm
eXt
Boot
Joined: 27 Dec 2003 Posts: 40 Location: Sweden
I will let my server run until it is finished, even thought i don't think it will be to any use since nru don't exist any longer. I'm not sure about how many attempts it tried so far, but it should be a lot of them
Btw, where can i find the IRC channels about acheron?
Posted: Mon Jan 05, 2004 8:37 pm
MageSteff
Pretty talky there aintcha, Talky?
Joined: 06 Jun 2003 Posts: 2716 Location: State of Denial
eXt wrote:
Btw, where can i find the IRC channels about acheron?
Genreal Gaming and puzzle IRC
Chat-solutions.org room #acheron, #unfiction
......
in game rooms (no OOC chatter while In Game Characters in room)
irc.thegamebox.net #caretaker, #shift (only used twice I think)
_________________Magesteff
A small group of thoughtful people could change the world. Indeed, it's the only thing that ever has. - Margaret Mead
Posted: Mon Jan 05, 2004 8:45 pm
AnthraX101
Entrenched
Joined: 18 Mar 2003 Posts: 797
If by "finished" you mean finishing the brute force attack, you'll be waiting a long while
(It will continue untill it finds them, even if that means grinding its gears into dust)
AnthraX101
_________________VGhlcmUgaXMgbm8gc3Bvb24u
ll----ll--ll--ll----l---ll---llll---ll--l--ll---llll-ll-l-ll-llll--l-.
Posted: Tue Jan 06, 2004 12:06 am
OnyxW_Hun
Boot
Joined: 29 Nov 2003 Posts: 56 Location: Budapest, Hungary
And this resume file is still only at "baaa" as password...
Posted: Tue Jan 06, 2004 6:13 am
Display posts from previous: All Posts 1 Day 1 Week 2 Weeks 1 Month 3 Months 6 Months 1 Year Sort by: Post Time Post Subject Author Ascending Descending