eJPT Junior Penetration Tester
eCPPTv2 Certified Professional Penetration Tester
eJPT Junior Penetration Tester
eWPT Web Application Penetration Tester
eCPPTv2 Certified Professional Penetration Tester
eCPTX Certified Penetration Tester eXtreme
Shop
Author
Patreon
HTB Pro Labs
More
Shop
Author
Patreon
HTB Pro Labs
Ask or search...
Ctrl + K
Linux Exploitation
Post Exploitation
Privilege Escalation
Cracking Shadow File
$1$ = MD5
$5$ = SHA256
$6$ = SHA512
use john the ripper
unshadow command
Previous
Restricted Shells
Next
Dump Memory Credentials
Last updated
2 years ago