Comments 0

If you’re unfamiliar with our ongoing contest, go read more about it!

Back? Good!

The second challenge:

  1. What are the fields for each shadow entry on a Linux system’s /etc/shadow file?
  2. What are the valid encryption methods for a salted hash in the shadow file?
  3. How are they represented?

In order to be a valid answer, you must provide all relevant man pages and section names the information can be found it. Once you’ve found the answer, make sure to send it in!

And remember:

  • Challenge #1 is still active!
  • Challenge #3 is still active!
  • You must make sure all your answers are in by December 5, 2017 0000UTC!



There are currently no comments on this article.


Enter your comment below. Fields marked * are required. You must preview your comment before submitting it.