

You can use wordlists or straight brute force. Unshadow passwd.txt shadow.txt > hashtocrack.txt

Now we need to combine these two files into one. It can be done with the following commands.Ģ – Combine passwd and shadow with unshadow Save them to your Kali Linux machine, preferably on the desktop. We will need both /etc/passwd and /etc/shadow. Play nice, support each other and encourage learning.We will start with collecting the hashes from the target machine.

We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g.

What we are about: quality and constructive discussion about the culture, profession and love of hacking. A subreddit dedicated to hacking and hacking culture.
