[ale] Hacking root password...

Chris Fowler ChrisF at computone.com
Mon Jul 31 08:18:55 EDT 2000





Here is what I would try:


1.  Boot linux and specify init=/bin/sh at the lili prompt


LILO: Linux init=/bin/sh



2. When you get a # prompt remount / as read-write


mount / -o remount,rw


3. Issue passwd command and change password



4.  Remount / as read-only


mount / -o remount,ro


5. restart system


-----Original Message-----
From: Carl Forsell [mailto:cforsell at roman.net]
To: ale at ale.org
Sent: Saturday, July 29, 2000 5:15 PM
To: ale at ale.org
Subject: [ale] Hacking root password...



I have a customer's server that they lost the password, and want me to hack.
They are running SuSE6.3 with scsi drives as sda1 & sda2. The box is a Dell
PIII.


I booted with the install disk, used the rescue disk and tried the
mount  -t ext2 /dev/sda1/mnt" command.  I tried to go to /mnt/etc/ and edit
the passwd file (I have done this 5 or 6 times on other machines and have
never had a problem).  On this box, I can not get to /mnt/etc!!!  (I have
tried just about every imaginable combination of the "mount" string - with
ext2, without ext2, with & without the -t, ...)


I hacked a similar box that had IDE drives as hda1, 2. and 3 and had no
problem.  Any suggestions?



--
To unsubscribe: mail majordomo at ale.org with "unsubscribe ale" in message body.







More information about the Ale mailing list