![]() It is possible, however, that the password hashes could also have been pulled directly from a database using SQL injection, an unprotected flat text file on a web server, or some other poorly protected source. In most cases, Offline Password Cracking will require that an attacker has already attained administrator/root level privileges on the system to get to the storage mechanism. Typically, this would be the Security Account Manager (SAM) file on Windows, or the /etc/shadow file on Linux. Offline Password Cracking is an attempt to recover one or more passwords from a password storage file that has been recovered from a target system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |