Credential Hunting in Linux
June 07, 2024
Last updated
June 07, 2024
Last updated
First we have to mutate the password that was given to us from the room hint
I just used the default custom rule from the room resources then i save it to mut_password.list
After that i just bruteforce it using username either Kira or kira that's why I did use wordlist for username
Just transfer the firefox_decrypt.py from the attacker machine to victim machine