Solved

Unix

Posted on 1998-09-02
6
234 Views
Last Modified: 2010-04-21
In telnet, I wanna acess the server as a ROOT, I telnet the server it ask for a login I type ROOT, and then ask password, I acctually don't know the password but Wanna enter in that server, is there any possobilities ??
0
Comment
Question by:Ameer
6 Comments
 
LVL 4

Accepted Solution

by:
jlms earned 200 total points
ID: 2006858
No. What do you think those passwords are good for???

Now, if you really want to try (you little hacker) the first step could be Satan, that checks cracks in the security of a computer (like stupid passwords for example).

   Keep in mind that accessing a machine where you are not suppossed to be could be awainst the law. So you have been warned.

0
 
LVL 2

Expert Comment

by:kellyjj
ID: 2006859
entering a machine you are not supposed to is against the law in most areas, especially if you are doing across state borders, or international borders.

Bad thing to do, if you ask me.
0
 
LVL 4

Expert Comment

by:jlms
ID: 2006860
there is more information about security in www.rootshell.com
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 2

Expert Comment

by:blowfish
ID: 2006861
Why don't you just ask the sysadmin for the root password.  If you're authorized and trusted to login as root on that machine, then I'm sure that they will gladly provide you with the root password.  

Additionally, most properly configured unix machines will not allow you to login as root from a telnet prompt, but you probably already knew that.  
0
 

Author Comment

by:Ameer
ID: 2006862
But I am using Windows98 and satan is for Unix....

Please guide me
0
 
LVL 4

Expert Comment

by:jlms
ID: 2006863
Nothing will do, check the rootshell website but if you don't have access is for a good reason.....

  Now, go away.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now