Jump to content
pyth0n3

decode 2

Recommended Posts

Posted (edited)

Ati intrat intrun server si ati gasit acest file care contine password-ul administratorului.Avand acest password aveti access root inntrun sistem Unix/Linux modern .

user:$6$Dqn5I/0XoX$Sm4nM66P0yekWtTee8PrZCr3sfBvNHVVOaEuFtGGtblDxqxzfUHkxPHMHOzs0ioqgzWmQyQEtY.jKWAazVdnF1:14598:0:99999:7:::

Care este password-ul?

Multe sisteme server Unix/Linux moderne folosesc de default acest algoritm .

ok , va dau un indiciu:

$6$- inseamna ca foloseste un algoritm SHA512 dar mai este unul Salt,aici descrie salt cryptography Salt (cryptography) - Wikipedia, the free encyclopedia ,

Acest file este extras din /etc/shadow

Nu e MD5 pt ca semnul ar fi trebuit sa fie $5$

Nu e greu , nu uitati foloseste 2 algoritmuri

Pt cei care incearca si nu reusesc scrietimi in PM cum ati facut si va voi ajuta ,vreau doar sa vad in ce mod incercati sa decodati

Puteti sa imi puneti intrebari ,dar nu ma intrebati lucruri de baza ,sau care le puteti citi pe internet

Ultimul indiciu:

Intrebati-il pe John .

Edited by pyth0n3

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...