Crack Is A Unix Password Cracking Program Designed To Allow System Administrators To Locate Users Who May Have Weak Passwords Vulnerable To A Dictionary Attack
Crack Is A Unix Password Cracking Program Designed To Allow System Administrators To Locate Users Who May Have Weak Passwords Vulnerable To A Dictionary Attack
Crack began in 1990 when Alec Muffett, a Unix system administrator at the University of Wales
Aberystwyth was trying to improve Dan Farmer's 'pwc' cracker in COPS and found that by re-
engineering its memory management he got a noticeable performance increase. This led to a total
rewrite which became "Crack v2.0" and further development to improve usability.
Public releases
The first public release of Crack was version 2.7a, which was posted to the Usenet newsgroups
alt.sources and alt.security on 15 July 1991. Crack v3.2a+fcrypt, posted to comp.sources.misc on
23 August 1991, introduced an optimised version of the Unix crypt() function but was still only
really a faster version of what was already available in other packages.
The release of Crack v4.0a on 3 November 1991, however, introduced several new features that
made it a formidable tool in the system administrators arsenal.
Crack v5.0a released in 2000 did not introduce any new features, but instead concentrated on
improving the code and introducing more flexibility, such as the ability to integrate other crypt()
variants such as those needed to attack the MD5 password hashes used on more modern Unix
and Linux systems. It also bundled Crack v6 - a minimalist password cracker and Crack v7 - a
brute force password cracker.
These could range from the simple (do not change) to the extremely complex - the
documentation gives this as an example:
X<8l/i/olsi1so0$=
Reject the word unless it is less than 8 characters long, lowercase the word, reject it if it
does not contain both the letter 'i' and the letter 'o', substitute all i's for 1's, substitute all
o's for 0's, and append an = sign.
These rules could also process the GECOS field in the password file, allowing the program to
use the stored names of the users in addition to the existing word lists.
Programs that generate valid CD keys or serial/registration numbers for a piece of software are
also commonly called keygens. These are made available by software cracking groups for free
download on various websites dedicated to software piracy. In some countries, the use of
keygens to activate software without purchasing a genuine code is illegal.
Legal issues aside, there are two major issues in using keygens: Product activation and online
key verification.
Keys generated with a key generator may not work with software that is used online, including
downloading software updates. This is because the user must confirm his serial number every
time the software connects to the server, and the key may be invalid for various reasons.
One reason is that the cracker may have misinterpreted the original algorithm, creating a key that
was "good enough" to let the software be installed, but not letting all possible future generated
keys be valid.
Another reason may be that the software developers only accept keys that they know were
distributed with the media during production, or had been issued with an online registration,
causing a cryptographically correct key to still be denied.
A third reason could be a secondary unpublished algorithm that is used by the vendor, e.g., to
extend the previous example, the characters 0, 7, 9, C, and K are never allowed. The software
that confirms the key on the user's machine does not know these numbers and characters are not
allowed, and will accept the keygen output, but the online confirmation fails.
Keys for massively multiplayer online games are different; usually each key is uniquely
generated by the producer and included with the product, usually in a tamper-proof medium such
as a scratch card or tamper-proof envelope. These keys will usually become uniquely linked to a
certain game account upon usage and are rendered "useless" by this process. Therefore, MMOGs
are not usually subject to piracy.
Keygens, like all programs, may also contain viruses. When the program is opened, instead of
(or in addition to) providing a valid key, the program may install harmful software on the
computer.
Keygens are widely available but the legality of their use differs internationally.
http://jillianpreston64.ji.funpic.de//index1.html