Unix saved encrypted passwords and decoding [closed] - unix

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 5 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
Where do linux systems keep the users encrypted passwords and how can it be decoded? Or maybe there is a workaround for getting the initial user's password? Thanks

the default directory to the file that keeps passwords in Unix systems is
etc/passwds
and in macOS
etc/master.passwds
https://docs.python.org/3/library/crypt.html
you can read about crypt library of python which may help you to decode the Unix password. One of the ways I do it is I generate all possible Strings of a certain length 8, and then compare the hash from that file with the hash of each of these words. I am not sure that it is the optimal way of solving this question but it works.
Take a look here:
Python generate all possible strings of length n

Related

why tos in ipv4 was not used at that time? what was its problem? [closed]

Closed. This question is not about programming or software development. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 3 days ago.
Improve this question
I am readign about ipv4 fields and I wonder why TOS which introduced in RFC 791 was not used at all?? but after DSCP was presented by RFC 2474 able to get good attention?
I can not find any clue to why it was not used!
I am new in this fields so please be cool :) when I ask silly questions

How to recover files encrypted by a ransomware (.nlah) [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
A ransomware encrypted all my files with the extension .nlah
I used Spyhunter 5 to scan my Windows 10 and delete the malwares.
Then I had to look for a way to recover my files with no success. This is the tool: EMSIsoft: ransomware-decryption-tools
I'm a doctor, and I save very important informations about my patients in that computer. So it's vital to recover those files. Can you help me please?
enter image description here
It is almost impossible to decrypt the files without knowing key and encryption mechanism.
Please make sure you have completed removed the ransomeware from your computer to avoid further damage.
If you have backup copy of your files then get it recovered from backup.

How to decrypt groovy file created by cim.bat of ATG [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
I have recorded execution of CIM.bat after installing ATG. However, I have forgotten to give noencryption flag, so the recorded file will be encrypted with the password I have given. Is there any way to decrypt the encrypted file generated by CIM if we know the password that is used to encrypt the CIM setup apart form rerunning the CIM?
Does ATG provide any API to decrypt these files?

Understanding user login flow for AIX [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I know that when a user logs into the AIX server, the system files csh.cshrc and csh.login are called. /etc/passwd also come into the picture. Can someone point me to a document that clearly explains the log in flow for a AIX machine. I mean which files are called and in what order?
This is not really AIX specific but shell specific. What csh does is not the same as what ksh does. If you install bash, it does something different still.
IBM pubs for 6.1 start here. Other versions of pubs have a similar path. In your case, do a search for: login csh
man csh has information about your question as well.
Hope this helps.

How a process create in UNIX [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
Can some one help me out here, it is necessary to complete my assignment.
I need to know,
how a process created in UNIX...? and
how a process created in MS-DOS...?
How is the unix process is different from MS-DOS process...?
I have fair knowledge about Operating Systems.I tried to find better answer on the internet, but I was unable to find in google, yahoo answers, etc...
Thank you........
You can do better than "the internet"...
Try:
Tannenbaum's Modern Operating Systems.
Page 735 for Linux, page 857 for Windows Vista (including MS-DOS).

Resources