[+] Cracking identified password hashes


[*] Found password data $1$gmEGnzIX$bFqGa1xIsjGupHyfeHXWR/ for further processing in rc.local
[*] Found password data aHR0cDovLyVzOiVzQG1lbWJlcnMuMzMyMi5uZXQv for further processing in librtsnm.so
[*] Starting jtr with a runtime of 3600 on the following data:
$1$gmEGnzIX$bFqGa1xIsjGupHyfeHXWR/
aHR0cDovLyVzOiVzQG1lbWJlcnMuMzMyMi5uZXQv

Created directory: /root/.john
Warning: detected hash type "md5crypt", but the string is also recognized as "md5crypt-long"
Use the "--format=md5crypt-long" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 1 password hash (md5crypt, crypt(3) $1$ (and variants) [MD5 256/256 AVX2 8x3])
Will run 8 OpenMP threads
Proceeding with single, rules:Single
Press Ctrl-C to abort, or send SIGUSR1 to john process for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:/usr/share/john/password.lst
admin            (?)     
1g 0:00:00:00 DONE 2/3 (2023-08-06 00:27) 5.263g/s 16168p/s 16168c/s 16168C/s chacha..mobydick
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 

[*] John the ripper final status: 1 password hash cracked, 0 left
[+] Password hash cracked: ?:admin