Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
How To find out password hash file and how to decrypt it
- First Open terminal and type
- cat /etc/shadow or
- more /etc/shadow or
- less /etc/shadow
- we have two tool inbuild in kali Linux System
- john
- johnny
when you are using john simply type
john <location of file>
so i typed john /etc/shadow
"/etc/shadow is location of shadow file of all users "
- just john cracked 3 user account password
- i am using easy password so john cracked easily
3. if you are using advance password then it would take hour
now i am using johnny to crack password
- johnny is gui based tool to crack passwords in Kali linux
Written By Sanjay Kumar
Comments
Post a Comment