Configuring John the Ripper
¨Attacker must feed John with a file that has all user account and password information ¨May need to merge /etc/password and /etc/shadow via “unshadow”
¨