Solved

getpwname( ) for shadow support ??

Posted on 1997-05-13
1
289 Views
Last Modified: 2008-03-10
I installed shadow password in my Linux machine, all my scripts using function getpwnam( ) now returned 'X' instead of 'encrypted' password. What do I do now? rewrite all of them? uninstall shadow? or some other functions support shadow? like getspnam( ) ?? Thanks.
0
Comment
Question by:administrator051397
1 Comment
 
LVL 1

Accepted Solution

by:
sherwood earned 100 total points
Comment Utility
I used the following script to create a conventional passwd
file to run crack on.  Under normal circumstances, most scripts
don't need the password.  If you need it, you can use this sort
of hoop rolling.

#!/usr/local/bin/perl
open (PASS, "/.secure/etc/passwd");
while (<PASS>){
  ($login,$passwd,$trash) = split(/\:/);
  $pass{$login} = $passwd;
   # above creates an associative array for passwds based on login
  }
close PASS;

open (PASSWD, "/etc/passwd");
while (<PASSWD>) {
         ($ypuser,$yppasswd,$uid,$gid,$Full,$home,$shell)=split(/\:/);
         $yppasswd = $pass{$ypuser};
         print "$ypuser:$yppasswd:$uid:$gid:$Full:$home:$shell";
         }
exit;

0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Many time we need to work with multiple files all together. If its windows system then we can use some GUI based editor to accomplish our task. But what if you are on putty or have only CLI(Command Line Interface) as an option to  edit your files. I…
I have been pestered over the years to produce and distribute regular data extracts, and often the request have explicitly requested the data be emailed as an Excel attachement; specifically Excel, as it appears: CSV files confuse (no Red or Green h…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now