On Mon, 2011-04-25 at 13:52 -0600, AJ ONeal wrote:
> How can you use jack the ripper to get into any of these?

Uhm... that's not what jack the ripper is for. Jack the ripper is
orthogonal to proper policy like locking accounts after a certain number
of failed login attempts.

After successfully compromising a password database, jack is used to
discover the original password based on the known hash. Once you
discover the password, you use it to attempt login to other systems.

Everything Aaron said was right. Everything you used as counter examples
was unrelated.


--------------------
BYU Unix Users Group 
http://uug.byu.edu/ 

The opinions expressed in this message are the responsibility of their
author.  They are not endorsed by BYU, the BYU CS Department or BYU-UUG. 
___________________________________________________________________
List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list

Reply via email to