Module 6 - skyleroriordan/my-tech-journal GitHub Wiki

to get the most recent shadow entries I used tail -n 3 /etc/shadow

unshadow is used to create a file that jtr can use. The command I used in the lab was unshadow etc_passwd.txt etc_shadow.txt > hash.txt

To crack with jtr I used john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

jtr

To crack with hashcat use hashcat -m 1800 -a 0 -o cracked.txt [hashpasswords] [worlist]

hashcat

creds

username Password Service
samwise RosieRosie HTTP
bilbo Rivendell107 HTTP
frodo 1Brandywine HTTP
pippin adminPippin HTTP
samwise.gamge Mallorn79 ssh
bilbo.baggins Frodo2013 ssh
peregrin.took 28Peregrin ssh
gandalf.grey gandalffrockyou ssh
boromir BoRomir200Z ssh
galadriel galadrielarwen111 ssh

reflection This lab was pretty tricky for me. Wrapping my head around salts and the makeup of hashes is a bit confusing but I think I'm getting a grasp on it.