google / turbinia

Automation and Scaling of Digital Forensics Tools
Apache License 2.0
731 stars 160 forks source link

Also try bruteforcing the shadow backup file #1444

Closed Fryyyyy closed 6 months ago

Fryyyyy commented 6 months ago

The backup shadow file can be useful for determining what the password was, if the attackers changed it post-compromise. Try and crack it, and also indicate where we got each cracked password from.

aarontp commented 6 months ago

@Fryyyyy I didn't want to merge this since I wasn't sure if you were completely done with the PR, but feel free to merge it if you are. Thanks!

Fryyyyy commented 6 months ago

I can't merge but PR is done and ready :)