An administrator has enabled salting for users’ passwords on a UNIX box. A penetration tester must attempt to
retrieve password hashes. Which of the following files must the penetration tester use to eventually obtain
passwords on the system? (Select TWO).
A.
/etc/passwd
B.
/etc/shadow
C.
/etc/security
D.
/etc/password
E.
/sbin/logon
F.
/bin/bash