in reply to Re: Brute forcing account logins.
in thread Brute forcing account logins.
If he had access to the shadow file, he could just hash the passwords and create a lookup table to run on the shadow files.
|
---|
In Section
Seekers of Perl Wisdom