Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
09-05-2007, 04:31 AM
|
#1
|
Member
Registered: Feb 2006
Posts: 97
Rep:
|
how to find lost password
Is there a way of decrypting /etc/shadow file, incase of finding out the lost passwords
|
|
|
09-05-2007, 04:37 AM
|
#2
|
Member
Registered: Sep 2005
Distribution: debian, solaris 10
Posts: 202
Rep:
|
why not just create a new password, if you have access to the system somehow.
this is done by
|
|
|
09-05-2007, 04:54 AM
|
#3
|
Senior Member
Registered: Oct 2005
Location: UK
Distribution: Slackware
Posts: 1,847
Rep: 
|
I was interested in seeing how secure my passwords were, so I starting trying to decrypt my /etc/shadow file. This is running on a Intel Core2Duo 2.7GHz, and after 23 hours, it hasn't managed one yet. I've since hardened my passwords, but at the time, one was 8 characters, only letters (upper and lower case), yet it still didn't find it. So in short, no, you can't decrypt /etc/shadow.
This question is of questionable intent as it's possible to use this information for malicious purposes. As mariogarcia said, if you have root access to the box, just change them. I've reported this to a moderator for them to make the call.
|
|
|
09-05-2007, 05:16 AM
|
#4
|
Member
Registered: Feb 2006
Posts: 97
Original Poster
Rep:
|
This ID is hard coded at the programming level therefore you can’t change it
|
|
|
09-05-2007, 05:20 AM
|
#5
|
Senior Member
Registered: Feb 2002
Location: Szczecin, Poland
Distribution: Gentoo, Debian
Posts: 2,458
Rep:
|
You can select which encryption method you would like for /etc/shadow
Most systems nowadays use md5sum encryption which is a 1 way sum of the password.
It's a pretty bullet proof method which is why it's mainstream.
If there was an easy way to decrypt /etc/shadow, the method would be changed quickly.
For the more secure/paranoid /etc/shadow exists but pam doesn't read it at all. A different file is chosen or db even..
|
|
|
All times are GMT -5. The time now is 07:40 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|