A hacker cracked 3 shadow files using Hashcat's mask feature and obtained usernames and passwords of 5 users - amca, alac, cear, csr, and nsa - from the cracked hashcat.potfile. The passwords were #a101754157, #a101465920, #a101957521, superman, and 112233 respectively.
A hacker cracked 3 shadow files using Hashcat's mask feature and obtained usernames and passwords of 5 users - amca, alac, cear, csr, and nsa - from the cracked hashcat.potfile. The passwords were #a101754157, #a101465920, #a101957521, superman, and 112233 respectively.
A hacker cracked 3 shadow files using Hashcat's mask feature and obtained usernames and passwords of 5 users - amca, alac, cear, csr, and nsa - from the cracked hashcat.potfile. The passwords were #a101754157, #a101465920, #a101957521, superman, and 112233 respectively.
A hacker cracked 3 shadow files using Hashcat's mask feature and obtained usernames and passwords of 5 users - amca, alac, cear, csr, and nsa - from the cracked hashcat.potfile. The passwords were #a101754157, #a101465920, #a101957521, superman, and 112233 respectively.