Module 6 - skyleroriordan/my-tech-journal GitHub Wiki
to get the most recent shadow entries I used tail -n 3 /etc/shadow
unshadow is used to create a file that jtr can use. The command I used in the lab was unshadow etc_passwd.txt etc_shadow.txt > hash.txt
To crack with jtr I used john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
To crack with hashcat use hashcat -m 1800 -a 0 -o cracked.txt [hashpasswords] [worlist]
creds
| username | Password | Service |
|---|---|---|
| samwise | RosieRosie | HTTP |
| bilbo | Rivendell107 | HTTP |
| frodo | 1Brandywine | HTTP |
| pippin | adminPippin | HTTP |
| samwise.gamge | Mallorn79 | ssh |
| bilbo.baggins | Frodo2013 | ssh |
| peregrin.took | 28Peregrin | ssh |
| gandalf.grey | gandalffrockyou | ssh |
| boromir | BoRomir200Z | ssh |
| galadriel | galadrielarwen111 | ssh |
reflection This lab was pretty tricky for me. Wrapping my head around salts and the makeup of hashes is a bit confusing but I think I'm getting a grasp on it.