Linux
Tips: To run a program with GUI, just type the program name in terminal, for eg. if you want to run
wireshark, just enter wireshark in the terminal.
If you want to run a program that does not have a GUI, try /.program name.
The password hash
The passwords are not stored in clear text. Instead a one way hash function is used. That means it is very difficult for an attacker to crack the password even if the hash is obtained. The hash can be obtained from /etc/shadow. It will look something like this:
You can see the root hash at the top. Now let's try and understand the hash. The common hashing algorithms are MD5, SHA-1 and SHA-2. SHA-2 is the most secure. This is my root password hash
root:$6$GkfJ0/H/$IDtJEzDO1vh8VyDG5rnnLLMXwZl.cikulTg4wtXjq98Vlcf/PA2D1QsT7VHSsu46B/od4IJlqENMtc8dSpBEa1:14592:0:99999:7:::
The first part, root is the user.
$6$ means that SHA encryption is used. For MD5, it will be $1$.
Upto the next : its the password.
14592 is the number of days after the last password change.
0 denotes the minimum no. of days the user must use a password before it can be changed.
99999 denotes the no. of days the password is valid for
7 denotes the no. of days after password expires that account is disabled.
Some useful commands
Bash scripting- The Basics
Locking the console
Backup using DD
Recovering files from DD
Subscribe to:
Posts (Atom)