I've been scratching my head on how to do this with hashcat for an hour. Didn't realize it was this easy with John the Ripper Thanks so much for this video
@HowToEverything13 жыл бұрын
John is an amazing tool really, hats off to the developers and people like you who demonstrate it for us!
@c0nd43 жыл бұрын
My pleasure to share the knowledge!
@MrGetstarted1003 жыл бұрын
one word for this video AMAZING, thank you for making this video
@c0nd43 жыл бұрын
Thank you for the support!
@jayodyamethmal2651 Жыл бұрын
Thank you for this amazing content that saved my day 💌
@c0ldman774 жыл бұрын
Hey youre videos are very good and easy to follow I like youre priv escalation playlist very much short and straight to the point helped me a lot thanks for youre help !
@c0nd44 жыл бұрын
Awesome! Glad to hear that you enjoyed it. Thank you for the support!
@DemonGamer30012 жыл бұрын
Thank you
@vlakvarkgaming59573 жыл бұрын
love you man! thanks
@SomeMoldyClan7 ай бұрын
Everything works but when i show results it says no passwords found looking 1 i dont get it?
@meteor-uw6us Жыл бұрын
thank you bro... it was useful for me 🤩
@rxtechandtrading Жыл бұрын
how was it useful for you-it doesnt work!! I tried it-y r u BS
@anast38173 жыл бұрын
Is it possible to change root's password hash without being root?
@c0nd43 жыл бұрын
If you have write access to /etc/shadow then yes
@adamquaydar16363 жыл бұрын
how did you get the permission for /etc/shadow so you cp is
@c0nd43 жыл бұрын
By default, only root can read the shadow file. If you are able to read it as a low privilege user, then there is a misconfiguration.