In this tutorial I demonstrate how to obtain a backdoor of the client system, grab the shadow file, and crack the shadow file for passwords giving us entry and control of the client's computer system. This is a continuation of my former Metasploit tutorial.
Credits
Music by Joystock - https://www.joystock.org
Disclaimer
This and all videos on my channel are for educational purposes ONLY intended for those seeking a career in pentesting and/or cyber security. Do NOT use this information for illegal purposes or you will end up in jail! I am not responsible for the use, misuse, or abuse of this information as offered. I do NOT condone unethical or illegal hacking or abuse of computer systems.
Download
0 formats
No download links available.
Metasploit Tutorial 4 - Shadow files, nmap, and John | NatokHD