首页 > 其他 > 详细

OSCP Learning Notes - Post Exploitation(3)

时间:2019-07-31 00:59:47      阅读:111      评论:0      收藏:0      [点我收藏+]

Post-Exploit Password Attacks

1. Crack using the tool - john (Too slow in real world)

Locate the rockyou file.

技术分享图片

 

john --wordlist=/usr/share/wordlists/rockyou.txt windows

 技术分享图片

john --show windows

技术分享图片

Conbine the files and save as unshadow.

技术分享图片

john --rules --wordlist=/usr/share/wordlists/rockyou.txt unshadow

技术分享图片

2.Using Hash craker on the Internet. (Suggested)

 8846F7EAEE8FB117AD06BDD830B7586C

技术分享图片

 3. Use the tool  hashcat

On Kali Linux.(Too slow locally)

hashcat -m 500 /usr/share/wordlists/rockyou.txt unshadow --force

技术分享图片

 On Windows

hashcat64.exe -m 500 unshadow.txt rockyou.txt

技术分享图片

技术分享图片

技术分享图片

 

Hash Craker Websites:

https://crackstation.net/

https://hashkiller.co.uk/

Tips: If it is hard to crack the password, do not waste time on it. Just skip it and find another way.

OSCP Learning Notes - Post Exploitation(3)

原文:https://www.cnblogs.com/keepmoving1113/p/11273528.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!