Linux Shadow Hack

Source: Internet
Author: User
Tags md5 hash

The main study of the next Linux/etc/shadow file password hack, learn the Hashcat tool simple and practical, specific can participate in: https://samsclass.info/123/proj10/p12-hashcat.htm

Because of the hash, the salt mechanism is used, so the traditional way of rainbow table will not play a role. Cracked methods are dictionary cracked and brute force cracked.

The hash algorithm in Linux/etc/shadow includes the default des Classic algorithm, the MD5 hash algorithm ($ $), the Blowfish encryption algorithm ($ $ or $2a), and the SHA hash algorithm ($ $ or $6). So the parameters for cracking using Hashcat are different, such as the MD5 hashing algorithm ($ $), using the Hashcat-m 500 parameter, the SHA hash algorithm ($ 1800 or $6), and the hashcat-m of the parameter.

When using Hashcat, the hash value is stored as an example of a MD5 hashing algorithm, stored as a $1$salt$encrypted, and a SHA hash algorithm as an example, stored as $6$salt$encrypted.

Linux Shadow Hack

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.