Credential Hunting in Linux
June 07, 2024

First we have to mutate the password that was given to us from the room hint
Kira:LoveYou1I just used the default custom rule from the room resources then i save it to mut_password.list

After that i just bruteforce it using username either Kira or kira that's why I did use wordlist for username


Just transfer the firefox_decrypt.py from the attacker machine to victim machine


Last updated