header bg

Scan QR code or get instant email to install app

Question:

A hacker named Jorge has acquired access to a Linux system. He's found the usernames and IDs. He needs the hashed passwords for the users he discovered. In which file should he look?

A /etc/shadow
explanation

Comments

Leave a Reply

Your email address will not be published.

*