Question: cracking linux password 1. Use the command chage -1 root command to verify password properties that you have collected in the /etc/shadow file. Show how
1. Use the command chage -1 root command to verify password properties that you have collected in the /etc/shadow file. Show how "Last password change" (output of chage -l command) relates to the "Last password changed in days)" field in the /etc/shadow file. 2. Based on the output of /etc/shadow file below, find out the salt value. root : $6$klwJ. IxtVqWMt xl. $VJk/tve1K6ZOVhR2 CYDnUmnP8aFkXuJ8FEy9f77x hu0TUolUgAFAF6xnmtRT79ZXuOIOBHZUFAZKMvF5CPC790:18283:0:99999:7::: 3. Create two users and use the same password. Compare both the salt values. Are they same or different? 4. How you can create /etc/shadow password manually? 5. How 512 bits hashed (64 bytes) uses 86 letters (fixed length)? Show the conversion
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
