


john/john.pot and press Enter to view the contents of the john.pot file. The cracked password is already stored in the john.pot file. Notice that it does not attempt to crack the password again. Type john /etc/shadow and press Enter to attempt to crack the Linux passwords again. Notice that the root password of 1worm4b8 was cracked.

Type john /etc/shadow and press Enter to crack the Linux passwords. Type cd and press Enter to go back to root.į. Type cat password.lst and press Enter to view the password list. Type ls and press Enter to list the files in the directory.ĭ. At the prompt, type cd /usr/share/john and press Enter to change directories to the folder containing the John the Ripper password file.Ĭ. Crack the root password on Support as follows:Ī. Open the LOG.txt file and inspect the contents.įind the Administrator account's password.ġ. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Plug the keylogger into the consultant laptop's USB drive. Move the consultant laptop from the Shelf to the Workspace. Move the keyboard USB connector to a different USB port on ITAdmin. In this lab, your task is to use the keylogger to recover the changed passwords as follows: After a week, the company executive lets you back into the IT Admin's office after hours again. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger.

With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. Your company has completed the legal documents needed to protect you and the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company.
