Please I will be grateful with step-by-step instructions on Kali Linux   You are performing a penetration test in which you need to crack a password of a specific user. You successfully reached the hash of a password from a remote server. The user you are interested in just posted her daughter's birthday photo on social media. Her daughter's name is Amy and today is Apr 16. You assume that a. "Amy" or its 3-character variances are in the password. People may use "@" to replace the letter "a". b. "16" is in the password c. "04" is in the password d. There is another special character (one from "!"#$%&\'()*+,-./:;<=>?@[\\]^_`{|}~'" ) in the password to make the password 8-character long. e. You don't know the order of a, b, c, and d You are given a passwords' hash: user2:$6$6OKxBQHQAl6Of1Fr$5Mjxx1dLAQuO9iyuiCR0ioXGklT/ybkH10u.U0ISP3Ls6pXkZ52sxiQF4L7JQi DZp4vG1olyzVJvJ0BQO5qYW1:18221:0:99999:7::: Answer the following questions: Crack the password. Put the screenshot of your result. Thank you very much    No hand written and fast answer with explanation

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Please I will be grateful with step-by-step instructions on Kali Linux

 

You are performing a penetration test in which you need to crack a password of a specific user.
You successfully reached the hash of a password from a remote server. The user you are
interested in just posted her daughter's birthday photo on social media. Her daughter's name is
Amy and today is Apr 16.
You assume that


a. "Amy" or its 3-character variances are in the password. People may use "@" to replace the letter "a".
b. "16" is in the password
c. "04" is in the password
d. There is another special character (one from "!"#$%&\'()*+,-./:;<=>?@[\\]^_`{|}~'" ) in the password
to make the password 8-character long.
e. You don't know the order of a, b, c, and d


You are given a passwords' hash:
user2:$6$6OKxBQHQAl6Of1Fr$5Mjxx1dLAQuO9iyuiCR0ioXGklT/ybkH10u.U0ISP3Ls6pXkZ52sxiQF4L7JQi
DZp4vG1olyzVJvJ0BQO5qYW1:18221:0:99999:7:::
Answer the following questions:
Crack the password. Put the screenshot of your result.

Thank you very much 

 

No hand written and fast answer with explanation 

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Creating a local network
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education