A Linux shadow file has fallen into your hands during a security assessment. Hidden within the cryptographic hashes lies a secret waiting to be uncovered. Armed with the right tools and techniques, can you break through the encryption and recover the hidden credentials? Time to put your password cracking skills to the test! 💪
Launch your dedicated AWS machine to begin hacking
The solution for this lab will be available on 12 Dec 2025 00:00 UTC.
To keep the new labs challenging for everyone, solutions are only available 1 month after a lab has been released or when it gets archived, whichever comes first.Choose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email