100%(32)32 out of 32 people found this document helpful
This preview shows page 1 - 6 out of 6 pages.
1Individual: Extracting PasswordsDavid D. CazierCYB/13013 August 2018Lori Nicholson
2Individual: Extracting PasswordsThis script takes two files, one representing the user account list, containing user logins and their real names, the other representing the Unix Shadow file, which contains the user account and hashed password. The two files are read line by line and the username, password, and real name for each account is stripped from the files and tested against an FTP server, that does not allow anonymous connections in an attempt to gain access. The script used is a modification of the script found on pages 58 through 59 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and
You've reached the end of your free preview.
Want to read all 6 pages?
forensic analysts, LORI NICHOLSON, Violent Python, Unix Shadow file