A Linux shadow file has fallen into your hands during a security assessment. Hidden within the cryptographic hashes lies a secret waiting to be uncovered. Armed with the right tools and techniques, can you break through the encryption and recover the hidden credentials? Time to put your password cracking skills to the test! 💪
Discover different approaches and techniques from hackers who completed this lab.
Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.
Start Hacking FreeChoose how you want to get started
Sign in to your account