Why do we need a crunch tool? Before starting this blog, we understand a scenario. During the password attack, we need a dictionary file. Dictionary files are usually text files that contain a large number of common passwords. These passwords often...
You have mid-engaged with Linux. Recently you installed Linux in your system. But few days later, you forgot your system password. “I remember when I was doing a penetration testing of a company. We saved /etc/shadow hash in a TXT file.”...
imagine the following situation You are an Ethical Hacker. while solving the CTF challenges, you want to send a file to the target machine. After lots of research, You discovered that there are no such tools exist in the target system...