How do I verify a password in Solaris 9 default install without using it ? I need to script this.

Long story short, I create a LOT of temp accounts for short term programmers from other lands.

What is the easiest way to verify they have an account and the password works WITHOUT using it.

I would like to create a little script that zips though.  

su  does not seem to behave well in a script :)

Who is Participating?
TintinConnect With a Mentor Commented:
In that case, you can verify the account exists by doing

grep username: /etc/passwd

for the password, you need to extract the encrypted password from /etc/shadow and then run it through the following perl script, eg:  somepasswd a3bL.vfoZZTk6
my ($pass,$encrypted) = @ARGV;
print "Match\n" if (crypt($pass,$encrypted) eq $encrypted);

Open in new window

Do you know what the password for the accounts is or will you have to guess it?
itguy411Author Commented:
I know it.  

I create it

Cloud Class® Course: Microsoft Office 2010

This course will introduce you to the interfaces and features of Microsoft Office 2010 Word, Excel, PowerPoint, Outlook, and Access. You will learn about the features that are shared between all products in the Office suite, as well as the new features that are product specific.

Duncan RoeSoftware DeveloperCommented:
If using shadow passwords, you need to be root because you have to verify passwords against /etc/shadow. Then you can run through /etc/passwd. Might be best to do with a C program - doing it in a script could be a bit of an ask
Duncan RoeSoftware DeveloperCommented:
Ok perl will do it
if ftp is enabled for these users (which is the default) then you may use ftp client to access and get some file. e.g. you can use

wget ftp://servername/etc/hosts --ftp-user=username --ftp-password=password

here link to download wget if you don't have it already installed:

please check the site for dependencies

(I know, it is not the best way to do so)
It could be a risk running a script or command with username/password as an argument.
If someone makes an '$>ps -ef' during this short time they will probably see a password or worse, username and password.

I wish I had and waterproof answer but at the moment I don't.
At least you could run these tests on a closed machine where only you have access?
the test can be run from a remote system where no users are using it
itguy411Author Commented:
This does work  
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.