在利用CGI漏洞得到了别机的密码列表,用什么软件解密,如下:
root:x:0:1:Super-User:/:/bin/csh daemon:x:1:1::/:
bin:x:2:2::/usr/bin: sys:x:3:3::/: adm:x:4:4:Admin:/var/adm:
lp:x:71:8:Line Printer Admin:/usr/spool/lp: uucp:x:5:5:uucp
Admin:/usr/lib/uucp: nuucp:x:9:9:uucp
Admin:/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:Nobody:/: noaccess:x:60002:60002:No Access
User:/: nobody4:x:65534:65534:SunOS 4.x
Nobody:/: jrchang:x:501:500:Ching-Ju
Chang:/sysnet/jrchang:/bin/csh glyeh:x:601:500:Gwo-Liang
Yeh:/system/glyeh:/bin/csh www:x:1001:1000:Apache
Server:/system/apache:/bin/csh sybase:x:1002:1000:Sybase
Adaptive Server:/system/sybase:/bin/csh wwwadm:x:1003:1000:Web
Content Maintain:/web/htdocs:/bin/csh
training:x:1004:1000:Training Center:/web/training:/bin/csh
manoff:x:1005:1000:College of
Management:/web/management:/bin/csh |