[ale] Hacking root password...
Chris Fowler
ChrisF at computone.com
Mon Jul 31 08:18:55 EDT 2000
Here is what I would try:
1. Boot linux and specify init=/bin/sh at the lili prompt
LILO: Linux init=/bin/sh
2. When you get a # prompt remount / as read-write
mount / -o remount,rw
3. Issue passwd command and change password
4. Remount / as read-only
mount / -o remount,ro
5. restart system
-----Original Message-----
From: Carl Forsell [mailto:cforsell at roman.net]
To: ale at ale.org
Sent: Saturday, July 29, 2000 5:15 PM
To: ale at ale.org
Subject: [ale] Hacking root password...
I have a customer's server that they lost the password, and want me to hack.
They are running SuSE6.3 with scsi drives as sda1 & sda2. The box is a Dell
PIII.
I booted with the install disk, used the rescue disk and tried the
mount -t ext2 /dev/sda1/mnt" command. I tried to go to /mnt/etc/ and edit
the passwd file (I have done this 5 or 6 times on other machines and have
never had a problem). On this box, I can not get to /mnt/etc!!! (I have
tried just about every imaginable combination of the "mount" string - with
ext2, without ext2, with & without the -t, ...)
I hacked a similar box that had IDE drives as hda1, 2. and 3 and had no
problem. Any suggestions?
--
To unsubscribe: mail majordomo at ale.org with "unsubscribe ale" in message body.
More information about the Ale
mailing list