Course
In this challenge, you will exploit weak file permissions to access the shadow file backup and crack the password of the 'victim' user using DES encryption. This involves using John-the-Ripper to decrypt the password and gain access to the 'victim' user's home directory to retrieve the challenge key.
Skills covered
Authorisation
Operating System
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.