Solved

I am in trouble !!!

Posted on 1998-02-27
5
208 Views
Last Modified: 2011-10-03
Hi actually i have unix operating system in my office and i am working as a admisnistrator in my company
and when I installed unix on a system I had installed unix on maximum security..
but one thing happend with me last week that I changed my root password and after that I forget that..

and there is so much data of our company in file system and unix are not giving me the chance to log in as a root
so what is the method of breaking my password and log in as a root in my unix machine ..and unfortunately no user has so much permissions. All users have ordinary END user permissions..
so please kindly reply me as fast as possible coz i have to solve this problem ...

thanks
zahid
0
Comment
Question by:zahziah
5 Comments
 
LVL 32

Accepted Solution

by:
jhance earned 30 total points
ID: 2008929
Can you boot the system from an install disk or alternate hard disk?  If so, you can mount the root filesystem and modify the root password.  This is why password based security is not really effective if an intruder has physical access to the hardware.
0
 

Author Comment

by:zahziah
ID: 2008930
do u have more suggestions regarding this question


0
 
LVL 32

Expert Comment

by:jhance
ID: 2008931
If you can get access to the passwd file (and you're not using shadow passwords) there are a number of cracker utilities out there that will use an exhaustive attack on the passwords.  This takes considerable time, however.  Possibly weeks.
0
 

Expert Comment

by:bagalp
ID: 2008932
You could even get your machine to single user mode and change the root passwd. The best bet is what jhance has suggested. You can get crack utilities to break the passwd file.
0
 
LVL 2

Expert Comment

by:khaled022498
ID: 2008933
What unix flavor do you have?
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now