Usage Tips:
- Click on a keyword to enable inline editing.
- Click inside a code block to copy (excludes comments).
- Use the button to view examples.
- Click outside to collapse all examples.
Shadow Hash Cracking
# Prepare an unshadowed hashes file
unshadow passwd shadow > unshadowed
Sample Output:
TO-DO
john --wordlist=/usr/share/wordlists/rockyou.txt unshadowed
Sample Output:
TO-DO
# yescrypt
john --format=crypt --wordlist=/usr/share/wordlists/rockyou.txt unshadowed
Sample Output:
TO-DO
hashcat -m 7400 unshadowed /usr/share/wordlists/rockyou.txt --force --user
Sample Output:
TO-DO