Lab 6.1 Password Cracking - Linux
Download seclists
Login with the Admin user

Dump the /etc/shadow file
Deliverable 1. Provide screenshots similar to the ones above showing the last 3 entries in /etc/passwd and /etc/shadow.


Deliverable 2. Research what hashing algorithm is being used on this server, one of the fields in /etc/shadow points to the format. Explain this.


Deliverable 3. Examine user Galadriel's shadow entry.
John the Ripper



Reverse Engineering with Python
Deliverable 5. Let's see if you can reverse engineer the shadow file using Python. The grayed-out area has the plaintext password for Gandalf. In the clear text part, you can see the rounds and the salt. Provide a screenshot similar to the one below. Use Boromir or Galadriel's shadow entry.



Hashcat

Deliverable 6. Crack at least one of the hashes using hashcat and show the passwords

CSV/Markdown file of Passwords
Deliverable 7. Start a text or csv or markdown file similar to the one below. Include your successful guesses from Week 5 as well as the cracks from this week. We will need this data in our future adventures. A listing or screenshot of all your acquired passwords. This type of material is normally called "loot" in hacker parlance. Documenting uncracked hashes is also a great idea. You may have better luck cracking them as you learn more about your target or decide to crack on a real workstation instead of a Kali VM.
User
password
service
Last updated