Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Distribution: On my PC I use RHEL, at office AIX, Solaris, HP-UX, RHEL.
Posts: 254
Rep:
How to break root's password?
Hi All,
As we know that at boot time when we see the OS selection screen we can press "e" to edit it that is Linux OS selection and enter single user mode from where we can easily break the root's password.
So, is there any other method do achieve the same result?
Hi All,
As we know that at boot time when we see the OS selection screen we can press "e" to edit it that is Linux OS selection and enter single user mode from where we can easily break the root's password.
So, is there any other method do achieve the same result?
Thanks!
Dev.
For maintenance purposes you can pass the 'single' parameter to the kernel but you would still need the 'root password'.
You can use your install cd/dvd to boot your system then perform mounts that can be chroot to the correct mount that allow you to edit as desired. These methods are used to correct problems on your system yet could be malicious performed.
Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed.
Using 'single user mode' seems to vary a bit between distributions and even their versions; earlier it was common that one could get root privileges by booting into that runlevel without any passwords asked, then some distributions started doing it so (by default) that one needed to enter root password even when booting into single-user mode, and now I again see that it works without the password. I wonder where it's all going..but if you don't set a password to your bootloader or BIOS, then I guess it's not much use to have one for single-user mode either.
All in all, if the disk is not encrypted, it's easy to break. When it is encrypted, it's just harder, not impossible. In the mean time check if other users can read files from your homedirectory; as odd as it sounds, the default policy on a lot of big distributions is to create files with permissions for others to read (but not modify) them..
Technically you could also use a live CD and just mount the HDD ... assuming the HDD is not encrypted.
I also question your motive for requesting such info. Whatever we will respond with kinda makes us accomplices to a potential crime, so I'd rather leave it as the simplest possible solutions.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.