Solved

Changing password without /bin/passwd

Posted on 1998-06-03
7
532 Views
Last Modified: 2013-12-15
I have a Linux slakware system, with two accounts: one with login name ventnor, and the other root. The root account was set up unpassworded, which is obviously a bad thing. My problem is that my system doesn't have a /bin/passwd program (or a passwd program in any other directory, apart from /usr/bin/passwd, which has nothing in it); so I'm wondering 1)how my system manages to authenticate me when I log in as ventnor (/etc/passwd has an encrypted field corresponding to "ventnor") and 2) how I can password my root account. I *do* have a /bin/logic binary. I'm probably missing something very obvious here, but I'd be grateful for any help.
0
Comment
Question by:sevrin
  • 4
  • 3
7 Comments
 
LVL 32

Accepted Solution

by:
jhance earned 100 total points
ID: 1627459
I'm assuming that someone deleted /usr/bin/passwd either intentionally or accidentally.  In either case, /usr/bin/passwd is NOT used to authenticate users.  That is the function of /bin/login.  It knows how to ask you for a password and compare it with the data in the password database, /etc/passwd.  The /usr/bin/passwd is used as a user interface to the /etc/passwd database allowing you to set/change password information.  Since you have a slakware system, you can get the /usr/bin/passwd program from a SlackWare distribution CDROM or the web site:

http://www.cdrom.com/pub/linux/
0
 

Author Comment

by:sevrin
ID: 1627460
Actually, you deserve more than a 100 points for giving me that Web reference, jhance - but unfortunately I'll need to save them for another question! But I really appreciate your help.
0
 

Author Comment

by:sevrin
ID: 1627461
Oops, I forgot to ask: where exactly on the site is /usr/bin/passwd to be found? The listing for the a disks isn't very informative as to content (I *think* it was the a disks I used originally.)
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 32

Expert Comment

by:jhance
ID: 1627462
I believe that it's in the a series of disks.  That's the core stuff and /usr/bin/passwd is pretty basic.
0
 

Author Comment

by:sevrin
ID: 1627463
There are nine disks, though, and each contains well over 1M, and the descriptions of what's inside them are completely obscure. Can anyone else help? For 50 points?
0
 
LVL 32

Expert Comment

by:jhance
ID: 1627464
Post your email address and I can email you /usr/bin/passwd from my SlackWare distribution.
0
 

Author Comment

by:sevrin
ID: 1627465
Thanks, jhance! It's ventnor@town.nd.edu.au
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now