I've been scratching my head on how to do this with hashcat for an hour. Didn't realize it was this easy with John the Ripper Thanks so much for this video
Hey youre videos are very good and easy to follow I like youre priv escalation playlist very much short and straight to the point helped me a lot thanks for youre help !
I've been scratching my head on how to do this with hashcat for an hour. Didn't realize it was this easy with John the Ripper
Thanks so much for this video
John is an amazing tool really, hats off to the developers and people like you who demonstrate it for us!
My pleasure to share the knowledge!
one word for this video AMAZING, thank you for making this video
Thank you for the support!
Thank you for this amazing content that saved my day 💌
love you man! thanks
Thank you
thank you bro... it was useful for me 🤩
how was it useful for you-it doesnt work!! I tried it-y r u BS
Everything works but when i show results it says no passwords found looking 1 i dont get it?
Is it possible to change root's password hash without being root?
If you have write access to /etc/shadow then yes
Hey
youre videos are very good and easy to follow
I like youre priv escalation playlist very much
short and straight to the point
helped me a lot
thanks for youre help !
Awesome! Glad to hear that you enjoyed it. Thank you for the support!
how did you get the permission for /etc/shadow so you cp is
By default, only root can read the shadow file. If you are able to read it as a low privilege user, then there is a misconfiguration.
Crack man, take your like👍👍
I can't even cat the shadow file :(
if the dude doesnt have john it's dead ^^'
It says command
not found
Hey! Which command were you trying to enter?
Nobody error
Plz help