Passwords and File Permissions
Plaintext passwords vs. password hashes
Last updated
Plaintext passwords vs. password hashes
Last updated
Passwords might be leaked through command line arguments. View terminal command history:
Or examine the .bash_history
file:
LinPEAS will find potential passwords as well.
If we have read permission on both /etc/passwd
and /etc/shadow
, then we can use unshadow
to combines passwd and shadow files and crack the password. Unshadow:
Search hash types in this table:
Suppose the hash starts with $6$
which corresponds to hash mode 1800. Crack the unshadowed password hash in Windows machine: