Kaiser784's Blog
  • whoami
  • Ingress
  • 90 Day High Frequency
    • Log-1
    • Log-2
    • Log-3
    • Conclusion
  • Making a Boot2root machine with docker
  • Adversarial ML
    • Practical Defenses against Adversarial ML
  • Certifications
    • eJPT
      • Cheatsheet/Notes
        • Enumeration
        • Web Attacks
        • System Attacks
        • Network Attacks
    • Dante ProLabs (HackTheBox)
  • Writeups
    • Google InternetCTF writeup
    • Lakera Gandalf LLM Security
    • OSPG Writeups
    • Matrix - AI Security Challenge by Repello writeup
    • WithSecure AI Challenge - My LLM Doctor writeup
    • WIZ Security Challenges
      • The BIG IAM Challenge writeup
      • K8S LAN Party Writeup
      • EKS Cluster Games Writeup
      • Prompt Airlines Writeup
  • Misc
    • Paul Kadali
    • Redirection
Powered by GitBook
On this page
  • John the Ripper
  • Unshadow
  • Hash Cracking

Was this helpful?

  1. Certifications
  2. eJPT
  3. Cheatsheet/Notes

System Attacks

Hashes and Passwords

John the Ripper

Unshadow

passwd is the /etc/passwd file shadow is the /etc/shadow file

unshadow passwd shadow > hash

Hash Cracking

john --wordlist=/etc/john/rockyou.txt hash

​

PreviousWeb AttacksNextNetwork Attacks

Last updated 3 years ago

Was this helpful?