Hi never_more,
> I tried what you said and it worked fine.
If by that you mean the nidump command, that produces a result that Jack the Ripper can understand but if you have shadow passwords, the hashes are all asterisks, carrying no information. The real hashes are where I told you but you need root access to even see some of the directories. This is how it should be. No one should be able to do what you're trying to do to a working machine. There's no way that testing passwords is worth removing that protection, to say nothing of using a weaker hashing algorithm.
If you want to test a known password, just use the Perl crypt command, like so:
perl -e 'print(crypt("password","Fc")."\n");'
Replace the word, password, in the above command, with the password you want to test. Then get a line from one of your many password files, put it in it's own file and replace the password hash with the output of the above command. Running John the Ripper on such files produce by a variety of passwords should give you some idea of the relative strengths of the different passwords without requiring you to compromise the security of your machine to do so.
Oh, "Fc" above is just a two-letter seed. You probably want to try a variety of your own.
--
Gary
~~~~
My parents went to Niagara Falls and all I got was this
crummy life.