Deception Group

Options Search

Deceptive Tools and Software

Ersatz Passwords

We modified how Linux-based operating systems store user’s passwords and incorporated a machine dependent machine function in the process. When an attacker steals the hashed passwords file (e.g., etc/shadow) and tries to crack the password, ersatz “fake” passwords are returned instead. The design of this tool can be found in this paper and the code, which was mainly developed by Christopher Gutierrez, can be found here.


 ·   Deception Home
 ·   Categories
 ·   Title List
 ·   Recent Changes
 ·   RSS
 ·   Atom

Create or Find Page: