Import from Unix/BSD/Solaris/AIX passwd/shadow file

Parent Previous Next

L0phtCrack 7 can extract Unix password hashes from the /etc/shadow file, which is where password hashes are usually found on a Unix system. L0phtCrack 7 can also extract user information from the /etc/passwd file. First select the File Format of the Unix system you are importing from.

For example, if the file came from a Linux system you'd select Linux: /etc/passwd & /etc/shadow. You can select to Keep Currently Imported Accounts if you are adding this import to accounts (hashes) you have already imported. If this option is not selected the import will overwrite any previously imported accounts.

You can also optionally select to Include Non-Login and Disabled Accounts. Next you use the Browse buttons to select the file(s) you wish to import. If you have chosen a File Format that has two files you are required to select the two files. L0phtCrack 7 can only crack a single Unix hash type at a time so if there are multiple hash types in the file you will need to select the type you want to crack. Only hashes of that type will be imported. You can then do the other hash types in later sessions.

You are now ready to select your audit settings.