Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I've reciently taken over the responsibility of network admin and was pretty damn ticked off to find out that the old guy had no knowledge of the root password for one of the servers. Although I've got the others under control, I hate the fact that I can't get into this one machine.
The machine runs SUSE Linux 6.2 and reloading is not an option. Does anyone know of a good method of cracking the password???
From the user manual of SUSE's 6.x version it says SUSE treats runleve 1 as a maintenance level for root users to configure environmental settings, with only 1 super user account allowed to login.
The word "Login" suggests it's going to prompt for a password. ?
Anyway from a search I dug up this which could help you regarding SUSE lost root passwords.
> 1) Turn on your computer,
> 2) wait til it says "lilo boot: "
> 3) type "linux init=/bin/sh", where you replace "linux" with the label
> you use for your default boot,
> 4) wait till you get a shell,
> 5) type 'mount -o remount,rw',
> 6) type 'passwd',
> 7) type your desired password
> 8) type sync or your changes will be lost upon reboot
> 9) type 'mount -o remount,ro /' just to be sure
I don't use Suse, but I would mount off a boot disk and edit the mnt/etc/shadow file changing the root users encrypted text to a blank :: Then login as root with a ^C when prompted for the password to skip it.
hum, ok if it's getting that far it must think your have the correct id so instead of typing passwd at that point, why not edit the /etc/shadow file with vi and replace the encrypted bit in the file that looks like this.
root:$1%Nu5eP34$OFA6AAqDyYf6ui9khtw/k1:11487:0:99999:7:::
(this is just an example yours will look something like this)
Change it to
root:$1$h6pRbM3d$I.HG2RWyc.Ys9i7eOK0y6/:11487:0:99999:7:::
(make sure you type this in exactly)
Then continue with the rest of the command to no. 9 and reboot.
Then login as root with a password of "ihatemondays" and change it to something you won't forget.
I don't understand how you are going to edit edit a root file without knowing the root password. If you can edit or even read this file without being root, then you may have some serious problems with your configuration. If this is the case I would moun the disk on another system, retrieve all of the important data and then do a fresh install.
You can try to check if you are root by doing a
echo $USER
Runlevel 1 is the single user level or maitenance level (means the same thing). If you cannot change your password from single user mode, then you may have a prolem with your pam libraries.
Try booting up with a bootdisk. and try mounting the root filesystem of your suse installation and editing the /etc/shadow file that way. If you do manage to get things working this way, I would look into why the way from raz would not work.
Why isn't reloading an option, reseting the root password is usually real easy to do. The directions from raz were correct. I am sensing serious server problems, which wouldn't surprise me. How was the old guy taking care of the server without having root access.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.