First, John the ripper In Linux, passwords are stored in hash format. You cannot reversely analyze passwords from the hash data table, but can be a group. After the word hash is compared with it, if it is the same, the password is guessed. It is very important to have a password that is difficult to guess. Generally, you can never use a word that exists in a dictionary as a password, which is quite easy to guess. In addition, you can't use some common regular alphanumeric arrangements as passwords, such as 123abc. John the ripper is an efficient and easy to use password guessing program. Its home page is at http://www.openwall.com/john/. Download the tar.gz format for UNIX program, and then use tar xvfz john*.tar.gz to open it to any directory. Enter the src directory, type make linux-x86-any-elf (I use redhat 6.1) will generate several executable files in the run directory, including the main program john. Now you need the Crack password to run ./john /etc/passwd. John can also crack the password generated by htpasswd to verify the apache user. If you create a user user with htpasswd -c apachepasswd user and generate a password, you can also use john apachepasswd to guess. John outputs the password on the terminal when he guesses the password, and saves the guessed password in the john.pot file. Another password cracker is known as the classic Cracker. The home page is at http://www.users.dircon.co.uk/~crypto/2. Logcheck Logcheck is used to automatically check system security intrusion events and abnormal activity records. Tool, which analyzes various Linux log files, such as /var/log/messages, /var/log/secure, /var/log/maillog, etc., and then generates a problem report that may have security issues. Automatically send an email to the administrator. . You can set it to run on an hourly basis, or automatically with crond every day. The logcheck tool's home page is downloaded from http://www.psionic.com/abacus/logcheck/and then tar xvfz logcheck* is used to open a temporary directory such as /tmp, and then use ./make linux to automatically generate the corresponding file to /Usr /local /etc, /usr /local /bin /and other directories, you may change the settings such as the mail account to send notifications, by default sent to root, you can set the root mail alias account to a group of people, change the settings Let it ignore certain types of messages such as plug-gw in your mail log file, because plug-gw does reverse IP lookup, if not found, logs a warning message to /var/log/maillog, logcheck default record All these warnings are sent to you and you can ignore them by setting them. Analyze all your logfiles with the logcheck tool, eliminating the need to manually check them every day, saving time and increasing efficiency. Tripwire Tripwire is a very useful tool for verifying file integrity. You can define which files/directories need to be verified, but the default settings can satisfy most of the requirements. It runs under four modes: database generation mode. , database update mode, file integrity check, interactive database update. When initializing the database generation, it generates a database file of various information about the existing files. In case your system files or various configuration files are accidentally changed, replaced, deleted, it will be based on the original database pair every day. Existing files are compared to find out which files have been changed. You can judge whether there are system intrusions or other unexpected events based on the results of the email. Tripwire's home page is at http://www.tripwiresecurity.com, and the version of tripwire-1.2.3 is free to use. If you use Redhat Linux 6.1, you can also get the latest Tripwire-1.2.3 rebuilt for 6.1. When you manually change the configuration file or program in the system, you can manually generate the database file again, run tripwire-initialize to create the databases directory in the current directory and generate a new system database file in the directory, then cp to /var/Overwrite the old one in the spool/tripwire directory.
Description of Requirement compile and install MySQL, PHP , and Apache to work a. The process o
In software development, tasks often have to go to sleep because some conditions are not met, and th
Layer 2 Tunneling Protocol (L2TP) is an industry standard Internet tunneling protocol that uses UDP
Its still a process of generating vmlinux from the compiled link. It is made up of a bunch of .o fi
Shell regular expressions use detailed explanation
Easily build your own DNS server under Linux
Get the current system time with C under Linux
Linux desktop environment GNOME practical skills
Detailed steps for Redis installation under CentOS 6.5
Linux Network Programming--Advanced Socket Function
Fedora Features - Smolt solves hardware compatibility problems
Win10 confirms that native support for 8K resolution screens requires 27 inches or more.
Win10 can not be installed WP recovery tool how to solve?
What if the Win7 computer headset has no sound?
Which computer can be used to play out
Three ways to reopen a closed Chrome tab
Anti-war Lonely Hero Mode Game Raiders Introduction
How does the computer remove the taskbar to get the windows10 icon?
How to insert a hyperlink in an Excel spreadsheet
How to access the disk space of Win8.1 Update with one click
Windows10 system laptop brightness can not be adjusted how to solve