Unix 15

Bookmarked!

This exercise is one of our challenges to help you learn more about Unix/Linux

PRO Medium < 1 Hr. 16532 Unix Badge
Course

In this challenge, you will exploit weak file permissions to access the shadow file backup and crack the password of the 'victim' user using DES encryption. This involves using John-the-Ripper to decrypt the password and gain access to the 'victim' user's home directory to retrieve the challenge key.

Skills covered
Authorisation Operating System
Included with PRO
Full course content 2 videos

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.