header bg

Scan QR code or get instant email to install app

Question:

A hacker named Jorge has acquired access to a Linux system. He's found the usernames and IDs. He needs the hashed passwords for the users he discovered. In which file should he look?

A /etc/shadow
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*