How To Detect Weak Mail Passwords On Your ISPConfig 3 Server
By Nedim Hadzimahmutovic <[email protected]>
This is a short tutorial on how to find out weak password for your mail users. This will save you you a huge headache since spammers will find out mail account with weak password and send spam email as that user which will result in your mail server being blacklisted.eval(ez_write_tag([[580,400],’howtoforge_com-medrectangle-3′,’ezslot_2′,121,’0′,’0′]));
Export mail users from database to local file
Use command below to export users and their passwords to local file.
# mysql -u root -p dbispconfig
Run this once logged in mysql.
mysql> SELECT email,password FROM dbispconfig.mail_user INTO OUTFILE ‘/tmp/sql.txt’ FIELDS TERMINATED BY ‘:’ ESCAPED BY ‘\\’ ENCLOSED BY ” LINES TERMINATED BY ‘\r\n’;
A file containing usernames and passwords is created in /tmp/sql.txt
Use “John the Ripper” to find out weak passwords
Install the program.eval(ez_write_tag([[580,400],’howtoforge_com-medrectangle-4′,’ezslot_1′,108,’0′,’0′]));
# apt-get install john
Load the exported mail user list from /tmp/sql.txt file.
# john -single /tmp/sql.txt
John will show you the cracked passwords. To see the cracked passwords later on run command below.
# john –show /tmp/sql.txt
To find out simple numeric passwords like 123456 run john in incremental mode.
# john –incremental=Digits /tmp/sql.txt
To find out simple alphanumeric passwords like abc123 use the wordlist mode as shown below.
# john –wordlist=/usr/share/john/password.lst /tmp/sql.txt
To see more examples run:
# zless /usr/share/doc/john/EXAMPLES.gz
When you finish, do not forget to remove the sql.txt file!!
# rm /tmp/sql.txt