Cardboard Iguana Security

Exploit weak /etc/shadow permissions

If /etc/shadow has weak permissions, then passwords in it can be replaced. To create a new password, use:

mkpasswd -m sha-512 $PASSWORD
Exploit weak etc-shadow permissions
Interactive graph
On this page
Exploit weak /etc/shadow permissions