In this video I use netcat to copy the shadow and passwd file from a linux machine. Once I have obtained these two files, I use John's unshadow command to combine them. Shortly after running a dictionary attack against these hashes, I reveal numerous accounts with weak passwords.