Therefore, I decided to do a search in Metasploit for the drb service, and found a Linux exploit that seemed promising (exploit/linux/misc/drb_remote_codeexec). Running that against the target system led immediately to another fresh shell, with root privileges.
When cracking passwords from a linux system, there are two files that need to be grabbed, the /etc/passwd file and the /etc/shadow file. We were able to get these files because of any of the previous exploits that got us root permissions. First, we need to format them for John The Ripper, our password cracker.
f448fe82f3