Linas Žvirblis wrote:

Brent Clark wrote:

My question is, how would they go about that? What tools or tests were
needed to test whether an account has a strong or weak password.

You should consult John the Ripper. He is likely to be found in "john"
package, although I do not know if this particular tool was used.
John's one, but there are any number of other network security tools that could have been employed. This is what they're for, - to establish the existence of weak passwords so that they can be rectified.

I find it hard to believe that a developer would be that slack, though.
If they are that pathetic in regard to compromising Debian servers, they need a kick up the arse.
Sure of your info?
Regards,




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to