🔬Hashes Dumping
Lab 1
Target IP:
192.75.64.3Password Hashes dumping -
/etc/shadow
Enumeration
ip -br -c a
192.75.64.2/24nmap -sV 192.75.64.3PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.3.3c
MAC Address: 02:42:C0:4B:40:03 (Unknown)
Service Info: OS: Unixsearchsploit ProFTPD 1.3.3
Exploitation
Postgresql is started to store all
metasploitloot and sensitive information from the target machine - Metasploit - PostgreSQL Workflows

Upgrade the sessions to a
meterpretersession

Hashes Dumping

📌
root:$6$sgewtGbw$ihhoUYASuXTh7Dmw0adpC7a3fBGkf9hkOQCffBQRMIF8/0w6g/Mh4jMWJ0yEFiZyqVQhZ4.vuS8XOyq.hLQBb.
Gather Linux Password hashes with
Metasploit
The unshadowed password file is a file containing the format hashed password, ready to be cracked.
Crack the Hash

Last updated
Was this helpful?
