Linux root password cracking summary Daquan

  

log in as root, execute: # passwd username (change password) # useradd username (add user)

specific examples are as follows: [root@bogon ~]# passwd rootChanging password for user root.New UNIX password:BAD PASSWORD: it is based on a dictionary wordRetype new UNIX password:passwd: all authentication tokens updated successfully.

Linux root password recovery method< Br>

Linux root enjoys supreme power. Once the root password is forgotten or stolen, it is a very headache. So how can I retrieve the root password? I summarize it as follows: (1) Linux System password cracking

1. Press e in grub option menu to enter edit mode 2. Edit kernel line /init 1 (or /single) 3. Press B to restart 4. After entering, execute the following command root@#passwd Root (configure the root password) Enter new unix password: enter the new password root@#init 6


(b) debian linux system password cracking

Grub option Single & rsquo; Debian GNU /Linux, … (recovery mode) & rsquo;, press e to enter the edit mode 2. Edit the last line of the kernel ro single changed to rw single init = /bin /bash, press b to perform the restart 3. After entering, execute the following command root@(none)#mount -a root@(none)#passwd root root@(none)#reboot


(3) Freebsd system password cracking

1. Boot into the boot menu 2. Select each item (press 4) to enter single-user mode 3. Enter a list of commands root@#mount -a root@#fsck -y root@#passwd (change password command) ) root@#root(username to crack password) Enter new unix password: root@#init 6 (restart)


(4) Solaris system password cracking bitscn.com

1. Select solaris failasfe item in the grub option menu. 2. System prompts Do you wish to have it mounted read-write on /a ?[y,n,?] Select y 3. Enter single user mode 4 Enter the following command #passwd #New passwd: Enter the new password #Re-enter New passwd: At the next time New password #init 6 (restart) bitscn.com


(5) NetBsd system password cracking

1. Boot: When the prompt symbol appears and starts counting down five In seconds, type the following command: > boot -s (Enter single-user mode command) 2. In the following prompt, enter pathname of shell or RETURN for sh: Press Enter. 3. Type the following command: # mount -a # fsck -y 4. Use passwd to change the password for root. 5. Use the exit command to enter multiplayer mode.


(six) debian linux system password cracking

1, on the Grub boot loader menu, select the entry you want to enter, type “e” Enter edit mode;

2, in the second line (similar to kernel /vmlinuz-2.6.15 ro root=/dev/hda2 ), type ”e” enter edit mode;

3. At the end of the sentence, add ”init=/bin/bash”, enter;

4, press “b” to start the system.

This way we can get a bash shell. After entering the shell, the root partition mount mode is read-only by default. We need to change it to writable. Otherwise, we cannot change the root password: mount -no remount , rw /passwd rootsyncmount -no remount,ro /reboot can successfully change the password of the debian root user.


(7)

1. Press Ctrl+X when starting linux, linux single or linux 1 at bash# prompt, then bash# Enter passwd root to change the password! After setting #init 6 Restart OK.

Also in: 2. Press Ctrl+X when starting linux, and type vi at bash# prompt Etc\\passwd, find root, delete the root:x:….“x”. I deleted the password!


(eight)

1. About lilo1. When the lilo: prompt appears, type linux single screen to display lilo: linux single2. Directly enter the linux command line 3. Use the password command to change the password. 2. About grub1. When the grub screen appears, use the up and down keys to select the one you usually start linux, then press the e key 2. Use the up and down keys again to select your usual start. Linux one (similar to kernel/boot/vmlinuz-2.4.18-14 ro root=LABEL=/), then press e. 3. Modify the command line you see now, join single, the result is as follows: kernel /Boot/vmlinuz-2.4.18-14 single ro root=LABEL=/single4. Enter and return, then press b to start, you can directly enter the linux command line 5. Change the password with the password command


(9)

1. Insert the system installation CD, restart the machine, press the Del button quickly when booting, enter the CMOS, change the boot sequence to the CD first, and then start the Linux installation. Program, press F5, press the prompt to enter Linuxrescue enter, enter the rescue mode, then select the language and keyboard, directly back It can program has prompted the Linux system installed on the hard disk under /mnt /sysimage, then appeared superuser #. 2, enter the hard disk etc directory: cd /mnt /sysimage /etc, first do backup anti-failure: cpshadowshadow.old modify the shadow file properties can be written: chmod + wshadow and then modified with vi: find the root user information The line: root:….:, the encrypted password between the first two colons, delete it (the colon can not be deleted), save and exit. This way the root password is empty. Users who do not use vi can take the following methods: find a DOS disk into the floppy drive, copy the Shadow to the dos disk: mcopyshadowa: /then modify it with the notepad in the attached file under Windows
, pay attention to To open the file type, be sure to select all files (*.*) and save the file to exit. Finally, copy back: mcopya: /shadowmnt /sysimage /etc3, change the Shadow property back to read-only: chmod-wshadow, and finally enter Exit to exit, remove the CD. 4, for security reasons, should be added to the root in the terminal window after the restart.

Copyright © Windows knowledge All Rights Reserved