Linux Password Hunting
Common Password Attack on Linux Machine
Config Files Search
Credentials in Configuration Files
Database Backup Search
Search Notes/txt Files
Search Scripts on Linux
Search Cronjob
Search SSH Private Key
File History
Search Password in PHP Files
Cracking Linux Credentials
Take a look at the unshadow.txt file. The field after the username (with a number or letter between two dollar signs) is the one that identifies the hash type used. It could be one of the following:
$1$ is MD5
$2a$ is Blowfish
$2y$ is Blowfish
$5$ is SHA-256
$6$ is SHA-512
$y$ is yescrypt
For $y$, for example, you can use the command:
Tools
Last updated