Solved

cannot change root directory to /mnt/sysimage in Rescue mode

Posted on 2007-03-24
4
3,604 Views
Last Modified: 2013-12-04
I have forget the redhat6.2 passsword,now i go to rescue mode and type command
chroot /mnt/sysimage but it is showing me error....
cannot change root directory to /mnt/sysimage:No such file or directory
Plz help me to change the root password.

Manish
0
Comment
Question by:manishsaxena2007
  • 2
4 Comments
 
LVL 38

Expert Comment

by:wesly_chen
ID: 18787263
Base on Red hat 6.2 manual, there is no /mnt/sysimage in rescue mode.
Please check the following manual:
http://www.redhat.com/docs/manuals/linux/RHL-6.2-Manual/ref-guide/s1-sysadmin-rescue.html

to mount your "/" directory to somewhere like
# mkdir /tmp/root
# mount -t ext2 /dev/hda5 /tmp/root  <=== assume /dev/hda5 is your "/")
0
 

Author Comment

by:manishsaxena2007
ID: 18788612
thanks,I have already done that but when i give command to change the password
then it doesnot accept it.even i can not able to open vi editor to change the password
files.Plz tell how to change the password .
0
 
LVL 38

Accepted Solution

by:
wesly_chen earned 250 total points
ID: 18789923
> even i can not able to open vi editor to change the password
files.

# mount -t ext2 /dev/hda5 /tmp/root  <=== assume /dev/hda5 is your "/")

After done this, do run "chroot /tmp/root", just edit the /tmp/root/etc/shadow file and delete the second column entry for root account, such as
root::XXX:XXX:XXX:::
      ^
       Delete this entry, which is the encrypted password.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Updating clients Trend Micro (OfficeScan) Console 5 89
4 Android flaws that leave 900M devices at Risk 7 74
Forensic audit of SBS 2008 3 83
Windows Password recovery 7 35
In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question