We will use a brute force method of attack on password hashes:
- Verify you have the shadow file copied in the root directory:
- To use a brute force attack against our shadow file we can use the following commands. This command will take a very long time to crack any passwords and is considered as a last resort:
cdjohn -incremental:lanman shadow
John the Ripper progress screen
You can press the spacebar at any time to get an update as to how the password cracking is going. Also, there are several options after ...