![]() Note: If your password hash and or file format is not supported, you can try Jumbo Ripper branch (availble on GitHub). This makes it more difficult to pivot to other accounts within a system, or across a database, because say, your password is hello123, the SHA256 hash is 27cc6994fc1c01ce6659c6bddca9b69c4c6a9418065e612c69d110b3f7b11f8a for example, but there isn’t a way to reverse that hash back to hello123 without having the password in a list or simply running through all the combinations of characters until you encounter the matching hash. So you can have a list of hashes on a server, but the passwords are not in plain text. We use hashes because they work one way, only mathematically. This is much faster than brute forcing from the outside of a network, as you have the hashes local to just run the algorithm against. What do you do now? If installing a rootkit is out of the question, or you would like to grab some passwords to pivot to other machines in the network, or whatever your usecase: crack the passwords. You want to reassure your access later on. So… you have finally rooted the server and aquired the coveted /etc/shadow file.
0 Comments
Leave a Reply. |