Cracking the passwords from the shadow and passwd files.

So you’ve managed to get root on a linux virtual machine, congrats! However this isn’t where the fun stops. From here you can access the files containing the usernames and their hashed passwords. These files are known as the passwd and shadow files. They can be combined into one file using the unshadow tool so […]

Login to ftp

So you have run an Nmap scan and you have open port 21 that has been identified as being ftp. What next? Run the NMap scan using the -A flag. This will tell you if the ftp allows anonymous login. The very simplest command you can enter at the prompt is: ftp Replace the […]