Passwords and File Permissions
Plaintext passwords vs. password hashes
Last updated
Was this helpful?
Plaintext passwords vs. password hashes
Last updated
Was this helpful?
Passwords might be leaked through command line arguments. View terminal command history:
Or examine the .bash_history
file:
LinPEAS will find potential passwords as well.
If we have read permission on both /etc/passwd
and /etc/shadow
, then we can use unshadow
to combines passwd and shadow files and crack the password. Unshadow:
Search hash types in this table:
Suppose the hash starts with $6$
which corresponds to hash mode 1800. Crack the unshadowed password hash in Windows machine: