Adversaries may attempt to dump the contents of/etc/passwd
and/etc/shadow
to enable offline password cracking. Most modern Linux operating systems use a combination of/etc/passwd
and/etc/shadow
to store user account information including password hashes in/etc/shadow
. By default,/etc/shadow
is only readable by the root user.(Citation: Linux Password and Shadow File Formats)The Linux utility, unshadow, can be used to combine the two files in a format suited for password cracking utilities such as John the Ripper:(Citation: nixCraft - John the Ripper)
# /usr/bin/unshadow /etc/passwd /etc/shadow > /tmp/crack.password.db
/etc/shadow file is accessed in Linux environments
Supported Platforms: Linux
Name | Description | Type | Default Value |
---|---|---|---|
output_file | Path where captured results will be placed | Path | /tmp/T1003.008.txt |
sudo cat /etc/shadow > #{output_file}
cat #{output_file}
rm -f #{output_file}
/etc/passwd file is accessed in Linux environments
Supported Platforms: Linux
Name | Description | Type | Default Value |
---|---|---|---|
output_file | Path where captured results will be placed | Path | /tmp/T1003.008.txt |
cat /etc/passwd > #{output_file}
cat #{output_file}
rm -f #{output_file}