John -wordlist=/usr/share/wordlists/rockyou.txt hashtocrack.txt In this example we define the wordlist to use to the built in rockyou.txt. Brute forcing takes a lot of time and I recommend you to only use it as a last resort when your wordlists won’t crack the hashes. The method I will use in this example is wordlist mode since that is the most effective way. You can use wordlists or straight brute force. Unshadow passwd.txt shadow.txt > hashtocrack.txt Now we need to combine these two files into one. It can be done with the following commands.Ģ – Combine passwd and shadow with unshadow Save them to your Kali Linux machine, preferably on the desktop. We will need both /etc/passwd and /etc/shadow. We will start with collecting the hashes from the target machine.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |