LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-22-2006, 05:09 AM   #1
wincrk
Member
 
Registered: Feb 2003
Distribution: Redhat 9.0
Posts: 104

Rep: Reputation: 15
revealing user's pasword


hi,
as an administrator, we could reset users password, but could we discover the pasword?
 
Old 04-22-2006, 05:22 AM   #2
ioerror
Member
 
Registered: Sep 2005
Location: Old Blighty
Distribution: Slackware, NetBSD
Posts: 536

Rep: Reputation: 34
Only by using brute force cracking (that's the whole point of passwords!). Or, you could hypnotise your users to help them remember...
 
Old 04-22-2006, 05:25 AM   #3
cs-cam
Senior Member
 
Registered: May 2004
Location: Australia
Distribution: Gentoo
Posts: 3,545

Rep: Reputation: 57
The short answer is no.
 
Old 04-22-2006, 08:42 PM   #4
J.W.
LQ Veteran
 
Registered: Mar 2003
Location: Boise, ID
Distribution: Mint
Posts: 6,642

Rep: Reputation: 87
Out of curiosity, why are you trying to accomplish this?
 
Old 04-23-2006, 11:56 PM   #5
wincrk
Member
 
Registered: Feb 2003
Distribution: Redhat 9.0
Posts: 104

Original Poster
Rep: Reputation: 15
just want to know how the system works. is this means that an administrator could not log in as a user without knowing his password or resetting his password.

lest say if the password could be brute force, how it could be done, there is nothing in "passwd" file.
 
Old 04-24-2006, 12:19 AM   #6
J.W.
LQ Veteran
 
Registered: Mar 2003
Location: Boise, ID
Distribution: Mint
Posts: 6,642

Rep: Reputation: 87
Quote:
Originally Posted by wincrk
lest say if the password could be brute force, how it could be done,
Any password can be broken by brute force. Brute force simply means that every single possible combination of characters that could be used in a password will be tested. If we assume that a password is 10 characters long, and that there are 128 ASCII characters that could be used in the password, then there are 10^128 possible combinations to test using brute force.

If you are attempting to eavesdrop on users without their knowledge, that would be considered cracking, and would not be welcome on the LQ forums
 
Old 04-24-2006, 01:22 AM   #7
spooon
Senior Member
 
Registered: Aug 2005
Posts: 1,755

Rep: Reputation: 51
Quote:
Originally Posted by wincrk
is this means that an administrator could not log in as a user without knowing his password or resetting his password.
No. root can always "su" to any user without password

Quote:
Originally Posted by wincrk
there is nothing in "passwd" file.
the password hashes are stored in the /etc/shadow file instead
 
Old 04-24-2006, 04:17 AM   #8
ethics
Senior Member
 
Registered: Apr 2005
Location: London
Distribution: Arch - Latest
Posts: 1,522

Rep: Reputation: 45
What an odd post, that being said all i have to do is ask users for their password, despite teling them not to give it me....
 
Old 04-24-2006, 04:55 AM   #9
jlliagre
Moderator
 
Registered: Feb 2004
Location: Outside Paris
Distribution: Solaris 11.4, Oracle Linux, Mint, Debian/WSL
Posts: 9,789

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Unix users should never give their password to anyone, even an administrator, as root doesn't need it to impersonate as any user anyway.
 
Old 04-24-2006, 05:58 AM   #10
cs-cam
Senior Member
 
Registered: May 2004
Location: Australia
Distribution: Gentoo
Posts: 3,545

Rep: Reputation: 57
Stoked this dude doesn't admin any computers I work on...
 
Old 04-24-2006, 07:01 AM   #11
ethics
Senior Member
 
Registered: Apr 2005
Location: London
Distribution: Arch - Latest
Posts: 1,522

Rep: Reputation: 45
These machiens i am on are running VNC server but the service is screwed and doesn't start, shame really, they might learn some things here

But no, you should not be trying to access users accounts without their permission, i don't even know the standing on this (whether the account is considered company property, or whether it's protected by privacy laws). If my employer tried that, they'd be in trouble
 
Old 04-24-2006, 09:22 AM   #12
Poetics
Senior Member
 
Registered: Jun 2003
Location: California
Distribution: Slackware
Posts: 1,181

Rep: Reputation: 49
Something to remember: if you 'su' into another user as root, the actions you perform will all have timestamps, but there will be no record of the user logging in, which is always suspicious.

I agree with cs-cam
 
Old 04-24-2006, 03:04 PM   #13
XavierP
Moderator
 
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 475Reputation: 475Reputation: 475Reputation: 475Reputation: 475
Moved: This thread is more suitable in Linux-Security and has been moved accordingly to help your thread/question get the exposure it deserves.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
what is the default root pasword? MurX Ubuntu 4 02-21-2006 04:08 AM
pasword Baghdad Linux - Newbie 2 12-01-2005 06:50 AM
samba pasword dirs deus1 Linux - Software 1 01-17-2005 06:09 PM
change user pasword israel Linux - Software 2 09-24-2003 08:52 PM
pasword database sqn Linux - Networking 1 04-25-2002 03:34 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:52 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration