Lab 6.1: Cracking Linux Passwords with JtR and Hashcat
Last updated
Last updated
During this lab we explored John the Ripper, Hashcat, and more understanding of the shadow file.
$6$ - SHA-512
$rounds=1000$ - “The more rounds are performed the higher the CPU requirements are. This is a safety mechanism which might help counter brute-force attacks in the face of increasing computing power.” https://access.redhat.com/articles/1519843
$LneEppAvGXMREfOV$ - Salt
$kOzEXBjXOD0XK3YJUgd5.nfQVq/gM3BEbKbARZu/BNQNi6Uu3cie5JvOIhkJ5A6mKGUIGKpUG3gFi4KE6xXW.$ - Salt + User password
What is the salt?
LneEppAvGXMREfOV
What is the hashed salt+password?
kOzEXBjXOD0XK3YJUgd5.nfQVq/gM3BEbKbARZu/BNQNi6Uu3cie5JvOIhkJ5A6mKGUIGKpUG3gFi4KE6xXW.
1 = Algorithm
2 = Number of rounds
3 = Salt
4 = Salt + Passwd
5 = Extra information Devin said was rarely used…
https://www.cyberciti.biz/faq/unix-linux-password-cracking-john-the-ripper/
The grayed out area has the plaintext password for gandalf. Provide a screenshot similar to the one below. Use Boromir or Galadriel's shadow entry.