Configuring John the Ripper
¨
Attacker must feed John with a file that has
all user account and password information
¨
May need to merge /etc/password and
/etc/shadow via “unshadow”
¨