Challenges

Shadow

Authorbadboys
CategoryCrypto
TagsBaby 
Points2
DateSun 04 May 2008
StateUp
StatusNot Solved
Solvers 2533
Votes7.29 (1492 votes)
Description
During his last penetration testing session, one of our consultants successfully obtained root privileges on a Linux server using a local privilege escalation vulnerability, and retreived the /etc/shadow below.

Your mission is to crack the root password.
A good wordlist might be useful...
root:$1$.rquYmlo$yFWfaSKplZmp1Id2VZ6iT1:15758:0:99999:7:::
daemon:*:14971:0:99999:7:::
bin:*:14971:0:99999:7:::
sys:*:14971:0:99999:7:::
sync:*:14971:0:99999:7:::
games:*:14971:0:99999:7:::
man:*:14971:0:99999:7:::
lp:*:14971:0:99999:7:::
mail:*:14971:0:99999:7:::
news:*:14971:0:99999:7:::
uucp:*:14971:0:99999:7:::
proxy:*:14971:0:99999:7:::
www-data:*:14971:0:99999:7:::
backup:*:14971:0:99999:7:::
list:*:14971:0:99999:7:::
irc:*:14971:0:99999:7:::
gnats:*:14971:0:99999:7:::
nobody:*:14971:0:99999:7:::
libuuid:!:14971:0:99999:7:::
Debian-exim:!:14971:0:99999:7:::
statd:*:14971:0:99999:7:::
Flag
Solvers
Login


No account yet? Register.
Last challenges
Last forum posts