AdminOct 9, 20204 minPost-Exploit Password CrackingIn this post, we will go through another way of grabbing the /etc/shadow file from the compromised system, and then crack the hashes.