She is using ftp to transfer the file to another hacker named John.

She is encrypting the file.

She is using John the Ripper to view the contents of the file.

She is using John the Ripper to crack the passwords in the secret.txt file.

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *