brute force hack a shadow password file (RTP300)

Discussion in 'General Discussion' started by tooncis, Apr 2, 2008.

  1. tooncis

    tooncis Addicted to LI Member

    I've been able to obtain the shadow file from the RTP300.

    How can I run it through a brute force attack?

    I'm not really a linux user, so preferably a windows based cracker.

    Actually, I'll be glad to post the shadow file here for someone to make a "crack" at.


    I'm guessing the encrypted password is "ABZ.GNxZ6Ayoc"?

    Have at it! ;)
  2. jeru

    jeru LI Guru Member

    Those sorts of things just take time. Have a look at "John the Ripper" to try and brute force it.
  3. tooncis

    tooncis Addicted to LI Member

    Based on what other people have mentioned about the Admin passwords (at least with previous firmware), it is an 8 character password with letters (small and capital) and numbers.

    It's probably going to take forever.

    I tried to replace the hash (with a known one) in the shadow file, or remove the 'x' in the passwd file, but I was not successful. Anyone know how to do it or if it is even possible?
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice