bars
eJPT Junior Penetration Tester
search
circle-xmark
β
Ctrl
k
Shop
Author
Patreon
HTB Pro Labs
More
ellipsis
chevron-down
copy
Copy
chevron-down
Linux Exploitation
chevron-right
Post Exploitation
chevron-right
Privilege Escalation
Cracking Shadow File
$1$ = MD5
$5$ = SHA256
$6$ = SHA512
use john the ripper
unshadow command
Previous
Restricted Shells
chevron-left
Next
Dump Memory Credentials
chevron-right
Last updated
3 years ago