A DTK Session
bin core lib root u vmlinuz
boot dev lost+found sbin usr vmlinuz.old
bzImage etc mnt shlib v vmlinuz2
cdrom home proc tmp var vmlinuz2.old
Filesystem 1024-blocks Used Available Capacity Mounted on
/dev/hda2 3793035 1879115 1711100 52% /
/dev/hdc1 4076976 2368763 1497244 61% /v
adm:63/w0ge8qUfnI:3:4:adm:/var/adm:
lp:RjRkevehM8V6U:4:7:lp:/var/spool/lpd:
sync:x9VyvGjRERY2U:5:0:sync:/sbin:/bin/sync
shutdown:yj1v6vMYPxffw:6:0:shutdown:/sbin:/sbin/shutdown
halt:WKN8QgpwP8ulo:7:0:halt:/sbin:/sbin/halt
mail:DFzHGvlrEVThU:8:12:mail:/var/spool/mail:/bin/false
news:pDiGlmmuUL.sc:9:13:news:/usr/lib/news:/bin/false
uucp:wCdy6t7Pf7QCY:10:14:uucp:/var/spool/uucppublic:/bin/false
No guest account on the machine
This is from a different computer
again from another computer
a fantasy password file created by
DTK to help determine how good
the attacker is at guessing passwords
core dump - the easy way out