Individual Extracting Passwords.docx - 1 Individual Extracting Passwords David D Cazier CYB\/130 13 August 2018 Lori Nicholson 2 Individual Extracting

Individual Extracting Passwords.docx - 1 Individual...

This preview shows page 1 - 6 out of 6 pages.

1 Individual: Extracting Passwords David D. Cazier CYB/130 13 August 2018 Lori Nicholson
Image of page 1
2 Individual: Extracting Passwords This script takes two files, one representing the user account list, containing user logins and their real names, the other representing the Unix Shadow file, which contains the user account and hashed password. The two files are read line by line and the username, password, and real name for each account is stripped from the files and tested against an FTP server, that does not allow anonymous connections in an attempt to gain access. The script used is a modification of the script found on pages 58 through 59 of Ch. 2, "Penetration Testing with Python," of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and
Image of page 2
Image of page 3
Image of page 4
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 6 pages?

  • Summer '18
  • forensic analysts, LORI NICHOLSON, Violent Python, Unix Shadow file

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture