Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I know everyone's run into the problem of forgetting the root password and not being able to log in.
I learned this little trick in school but I'd like to know if this works with all Linux distros. As of this moment I've tested it with Suse 9.1 Professional and Fedora Core 3 using both LILO and GRUB.
To gain root access, at the boot screen you have to type the following as the boot option: init=/bin/bash
Linux should then give you a command prompt. Next type mount -o rw,remount / to remount the root filesystem read-write. Then you can run passwd to change the root password. Once that is done type mount -o ro,remount / and then hit CTL+ALT+DEL to reboot the system. You should then be able to login using the new password.
It will work, provided that no authentication has been set up in the bootloader for people who try to change kernel params. GRUB and (I believe) LILO support adding a password that a user must enter before being able to change the kernel command line.
it may be easier to bypass the bootloader password by just using a knoppix cd to access the hard drives
then mounting the partition that contains /etc/passwd
then issuing the passwd command to your new password?
if you want someone to use your pc locally you would give them an account aka userid
giving them a bootloader password does not help them......it may scare off some intruders but if that is your aim consider a bios password.
Unless you put a lock around your case so keyboards can not removed power switches touched etc i don't see how much paranoria you need.....
btw a bios passwd can be bypassed......remove bat
a bootloader passwd can be bypassed.....knoppix
a login passwd can be be bypassed......knoppix
if your system is not fully encrypted......mine isn't and i don't see the point.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.