A Linux shadow file has fallen into your hands during a security assessment. Hidden within the cryptographic hashes lies a secret waiting to be uncovered. Armed with the right tools and techniques, can you break through the encryption and recover the hidden credentials? Time to put your password cracking skills to the test! 💪
Launch your dedicated AWS machine to begin hacking
Choose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email