The main study of the next Linux/etc/shadow file password hack, learn the Hashcat tool simple and practical, specific can participate in: https://samsclass.info/123/proj10/p12-hashcat.htm
Because of the hash, the salt mechanism is used, so the traditional way of rainbow table will not play a role. Cracked methods are dictionary cracked and brute force cracked.
The hash algorithm in Linux/etc/shadow includes the default des Classic algorithm, the MD5 hash algorithm ($ $), the Blowfish encryption algorithm ($ $ or $2a), and the SHA hash algorithm ($ $ or $6). So the parameters for cracking using Hashcat are different, such as the MD5 hashing algorithm ($ $), using the Hashcat-m 500 parameter, the SHA hash algorithm ($ 1800 or $6), and the hashcat-m of the parameter.
When using Hashcat, the hash value is stored as an example of a MD5 hashing algorithm, stored as a $1$salt$encrypted, and a SHA hash algorithm as an example, stored as $6$salt$encrypted.
Linux Shadow Hack