Thursday, April 7, 2011

Step 5 - Escalation

Now that were on our target we need to escalate to root privileges. First step was to edit that shadow file




























Now you can run John against the hash or we could just copy pirrips and overwrite the root password, which is what I did in this example










Lets see if it works

No comments:

Post a Comment