Back to Blog
Wireshark log analysis6/19/2023 ![]() ![]() ![]() I used a tool called Hashcat to crack these hashes and I was able to recover two passwords: hashcat64.exe -m 1800 -a 0 hash.txt rockyou.txt -o cracked.txt manager:forgot sean:spectreĦ. ![]() What credentials (username:password) were used to gain access? Refer to shadow.log and sudoers.log.Īs part of the challenge, we received a shadow.log and a sudoers.log files. This means that there were 52 failed attempts to establish an SSH session.ĥ. We can see that there is a total of 54 attempts to establish an SSH session, with only two being successful based on the bytes being sent from the server (B) to the client (A).
0 Comments
Read More
Leave a Reply. |