Tagged articles
2 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Mar 28, 2025 · Information Security

Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking

This guide walks you through systematic Linux password hunting techniques—including searching filenames, scanning file contents, extracting credentials from web and config files, cracking hashes with Hashcat and John, leveraging hidden files, MySQL databases, backup archives, and automating discovery with LinPEAS—to elevate privileges and gain full root access.

HashcatJohn the RipperLinux
0 likes · 30 min read
Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking
MaGe Linux Operations
MaGe Linux Operations
Aug 2, 2024 · Information Security

Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking

This guide walks through systematic techniques for hunting passwords on a Linux target, covering filename and content searches, web and config files, hidden directories, MySQL credential extraction, backup analysis, protected archives, and automated enumeration with LinPEAS, while demonstrating practical use of tools like Hashcat and John the Ripper.

HashcatJohn the RipperLinPEAS
0 likes · 28 min read
Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking