@govsec said:
You are correct to use that tool. What will matter next is the attack and hash you will use. Dont forget the “stone” cause the pass is there
Thanks, I ended up doing it with the exploit itself and the queen song wordlist.
Now stuck on root. See the processes with pspy
but don’t know what to do with them.