Username – you should certainly know this

Password – don’t expect a real password here, as every password in linux is either hashed or encrypted by a one way algorithm, except in case the application is a poor one.

UID – User ID

GID – Group ID

Description : like a comment in blue color

User Home Directory : the directory where user heads out after the login.

Command or shell path : Usually it is some shell like sh,bash,awk,ksh. as the application choose to include a path in bash(and design accordingly) rather than developing a complete shell.


There’s also a similar one called, shadow @ /etc/shadow. it contains the hashed data of passwords. As they are formed by one way algorithms, it impossible to crack. There are some ways like comparing two hashes of similar keys and predicting the one way function formulae(only for the weakest of all).


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s