Credential Hunting in Linux

June 07, 2024

First we have to mutate the password that was given to us from the room hint

Kira:LoveYou1

I just used the default custom rule from the room resources then i save it to mut_password.list

After that i just bruteforce it using username either Kira or kira that's why I did use wordlist for username

Just transfer the firefox_decrypt.py from the attacker machine to victim machine

Last updated