A Linux shadow file has fallen into your hands during a security assessment. Hidden within the cryptographic hashes lies a secret waiting to be uncovered. Armed with the right tools and techniques, can you break through the encryption and recover the hidden credentials? Time to put your password cracking skills to the test! 💪
Launch your dedicated AWS machine to begin hacking
In this challenge, you'll practice Linux password cracking techniques by analyzing a shadow file obtained during a security assessment. The shadow file contains password hashes that need to be cracked to recover user credentials.
During a penetration test, you've successfully obtained a copy of the /etc/shadow file from a Linux server. This file contains hashed passwords for various system users. Your task is to crack these hashes and recover the plaintext passwords. Once you've successfully cracked a password, you'll find the flag hidden within the credentials.
The provided shadow file contains multiple user accounts. Focus on accounts with actual password hashes (not * or !) to find crackable credentials.
Choose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email