LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-14-2013, 03:16 PM   #1
joebob137
LQ Newbie
 
Registered: Oct 2013
Posts: 3

Rep: Reputation: Disabled
Grub password format


Is the grub-crypt in the same format as passwd crypt? I know it supports fewer hash schemes, but basically I'm trying to see if I can crack the pw with a generic cuda cracker or if I have to write something special...

Lest someone tell me how I can just disable the password, what I'm actually trying to recover is a BIOS password that I'm pretty sure is the same as the grub password. I'm making a last ditch attempt here before I shell out money for an eeprom reader that I will doubtless never use again, not to mention the hours and risk in disassembling and reassembling everything.

Lucky me BIOS passwords are restricted to 7 character A-Za-z0-9 so it should be possible to brute force. And of course as an aside, this is why you should *not* set your BIOS password the same as something else if you depend on it for security. Though then again, its not clear what a BIOS password would prevent if someone has time, skills, and the physical access to take out the hdd and read it.
 
Old 10-14-2013, 03:24 PM   #2
Robhogg
Member
 
Registered: Sep 2004
Location: Old York, North Yorks.
Distribution: Debian 7 (mainly)
Posts: 653

Rep: Reputation: 97
The GRUB password isn't the same as a BIOS password. BIOS passwords are stored in CMOS memory on the motherboard, and there's usually a jumper or dip switch allowing you to clear it.

And yes, physical security is important. nothing but disk encryption stops anything for someone with unrestricted access to the hardware.

Last edited by Robhogg; 10-14-2013 at 03:28 PM.
 
Old 10-14-2013, 04:10 PM   #3
joebob137
LQ Newbie
 
Registered: Oct 2013
Posts: 3

Original Poster
Rep: Reputation: Disabled
Sorry, I meant that in this particular case I remember setting them to the same thing. I've since forgotten both, but since there's no way to get at the BIOS password (this is a lenovo and unfortunately there is no such jumper), I'm going for the grub one instead in the hopes that I remember correctly that they're the same.
 
Old 10-14-2013, 11:04 PM   #4
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,670
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
If you need to get to the drive, just yank the drive and stick it into another computer temporarily.

If you need to get the motherboard to talk to you, "Google" the documentation on the mobo ... there's always some obscure DIP-switch setting that will reset/override the BIOS password.

In both cases, the intended defense is meant to be against someone who for whatever reason can't "just open the thing up, yank the drive, and so on." If you can do these things, then these defenses are (usually ...) designed to be rather easily circumvented "as a matter of practical necessity."
 
Old 10-15-2013, 03:20 PM   #5
joebob137
LQ Newbie
 
Registered: Oct 2013
Posts: 3

Original Poster
Rep: Reputation: Disabled
I can get to the drive---otherwise I wouldn't be able to get the grub password hash in the first place. As for the magic dip/jumper, trust me, no such thing exists. Lenovo, at least in most models, stores the supervisor password in a seperate eeprom rather than in CMOS. Thus even removing the CMOS battery and letting it sit for weeks won't clear it. Lenovo's recommended way of dealing with this situation is to buy a new motherboard. Seriously. Of course, people have figured out a way around this, but that involves taking the thing apart and connecting the disassembled computer to power, then probing the leads of the eeprom and connecting that to a second computer/device via some eeprom chip. Anyway, in theory it should be easy to pop the hard disk, transfer the hash from grub, then use a cuda-based cracking program to brute force the password. Maybe not a lot easier, but at least I wouldn't have to buy eeprom-serial or whatever chips and go probing my disassembled yet powered on motherboard. Basically I just want to know that the grub password is a normal format before I start, so that I won't waste my time with false negatives.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
GRUB security. -How do I properly set, and double check the grub bootloader password? bwilky11 Debian 3 11-02-2012 08:22 PM
how to change root password without knowing the grub password ramesh.mimit Red Hat 8 10-15-2011 05:12 AM
How do I need to format grub entry to boot from grub2 into grub legacy? mitchell7man Linux - Software 6 04-03-2010 03:03 AM
change Root Password even if the password in the grub is also set sheelnidhi Linux - General 6 08-30-2006 07:27 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:45 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration