Passwd, Shadow & Opasswd
Passwd File
# It the /etc/passwd file is writable by us
# Editing /etc/passwd - Before
root:x:0:0:root:/root:/bin/bash
# Editing /etc/passwd - After
root::0:0:root:/root:/bin/bashShadow File
If the password field contains a character, such as ! or * the user cannot log in with a Unix password. However, other authentication methods for logging in, such as Kerberos or key-based authentication, can still be used.
Algorithm Types
$1$β MD5$2a$β Blowfish$2y$β Eksblowfish$5$β SHA-256$6$β SHA-512
Opasswd
The PAM library (pam_unix.so) can prevent reusing old passwords. The file where old passwords are stored is the /etc/security/opasswd. Administrator/root permissions are also required to read the file if the permissions for this file have not been changed manually.
Cracking Linux Credentials
Unshadow
Hashcat - Cracking Unshadowed Hashes
Hashcat - Cracking MD5 Hashes
Last updated