Home
About
Our Team
Contact
Sebastian Garcia
Veronica Valeros
Datasets
CTU-13 Dataset
IoT-23 Dataset
Hornet: Network Dataset of Geographically Placed Honeypots
Datasets Overview
Malware Captures
Normal Captures
Mixed Captures
Malware on IoT Dataset
Android Mischief Dataset
F.A.Q.
Stratosphere IPS
Stratosphere IPS
Technology
Stratosphere IPS for Linux
Stratosphere Testing Framework
Download
Kalipso
Projects
AI Dojo
GSoC
Defensive LLMs
Cybercrime Research
Aposemat Project
Civilsphere
Civilsphere AI-VPN
Project Ludus
ManaTI
Nomad
Thesis Projects
A Study of RATs
A Study of IoT Malware
Icarus Project
AD-Honeypot Evasion Game
The Blocklist Generation Project
Stratosphere IPS
FEEL Project
Tools
Should I Click
Hexa Payload Decoder
Zeek Anomaly Detector
Zeek IRC Feature Extractor
AIP Tool
Publications
Open Positions
Research Blog

Stratosphere IPS

Home
About
Our Team
Contact
Sebastian Garcia
Veronica Valeros
Datasets
CTU-13 Dataset
IoT-23 Dataset
Hornet: Network Dataset of Geographically Placed Honeypots
Datasets Overview
Malware Captures
Normal Captures
Mixed Captures
Malware on IoT Dataset
Android Mischief Dataset
F.A.Q.
Stratosphere IPS
Stratosphere IPS
Technology
Stratosphere IPS for Linux
Stratosphere Testing Framework
Download
Kalipso
Projects
AI Dojo
GSoC
Defensive LLMs
Cybercrime Research
Aposemat Project
Civilsphere
Civilsphere AI-VPN
Project Ludus
ManaTI
Nomad
Thesis Projects
A Study of RATs
A Study of IoT Malware
Icarus Project
AD-Honeypot Evasion Game
The Blocklist Generation Project
Stratosphere IPS
FEEL Project
Tools
Should I Click
Hexa Payload Decoder
Zeek Anomaly Detector
Zeek IRC Feature Extractor
AIP Tool
Publications
Open Positions
Research Blog
Veronica Valeros
October 22, 2020

A visual display of /etc/passwd and/etc/shadow

Veronica Valeros
October 22, 2020

An entry from '/etc/passwd' explained

The passwd file contains information about the users, ,their login name, user and group IDs, home directory and other information. [[Read more]]

An entry from '/etc/shadow' explained

The shadow file contains the actual user encrypted password along with other information. [[Read more]]

BSY Security Class Diagrams - _etc_shadow (L).jpg

Tagged: linux, shadow, passwd, diagrams

Newer PostWhite Paper: Current State of IPv6 Security in IoT
Older PostData Exfiltration via IPv6

Protecting the civil society through high quality research

Back to Top
Karlovo náměstí, Praha, Czech Republicstratosphere@aic.fel.cvut.cz

Powered by Squarespace