On 11/21/2016 09:25 PM, Robert Moskowitz wrote:
> I have a running system that I have forgotten the root password. I really do
> not want to take down the system, go through the steps to boot up in single
> user mode and change the password.
Is the system fully patched?
If not, maybe you have s
On 11/21/2016 02:25 PM, Robert Moskowitz wrote:
> I have a running system that I have forgotten the root password. I
> really do not want to take down the system, go through the steps to boot
> up in single user mode and change the password.
>
> I just happen to have used the same password on
On Mon, Nov 21, 2016 at 08:07:26PM -0500, Matthew Miller wrote:
> On Mon, Nov 21, 2016 at 03:25:40PM -0500, Robert Moskowitz wrote:
> > Well john has been working for 20 hours (one cpu pegged at 100%). I
> > did not think the password was that complex!
>
> Without using cloud resources or multipl
On 11/21/2016 07:44 PM, Rick Stevens wrote:
On 11/21/2016 04:33 PM, Robert Moskowitz wrote:
The stupid build for this system has no sudo installed!
First thing I fix once I recover the password...
john has been running for 35 hrs.
Uhm, running a cracker for 35 hours is more efficient than r
On Mon, Nov 21, 2016 at 03:25:40PM -0500, Robert Moskowitz wrote:
> Well john has been working for 20 hours (one cpu pegged at 100%). I
> did not think the password was that complex!
Without using cloud resources or multiple GPUs, these programs are
really going to be effective with older -- and
Hate to say it but you could have booted to a live disk and reset the
password by now, unless the drive is encrypted... Just an interesting
problem at this point. Still worth pursuing for the "can it be done" value
IMO.
___
users mailing list -- users@li
If you want no downtime, use sucrack+john.
Take https://labs.portcullis.co.uk/download/sucrack-1.2.3.tar.gz and
https://github.com/magnumripper/JohnTheRipper
Compile and run as folows
./john -min-len=8 -max-len=12 -mask="password?d" --stdout |
SUCRACK_AUTH_FAILURE="su: Authentication failure" ./s
On 11/21/2016 04:33 PM, Robert Moskowitz wrote:
> The stupid build for this system has no sudo installed!
>
> First thing I fix once I recover the password...
>
> john has been running for 35 hrs.
Uhm, running a cracker for 35 hours is more efficient than rebooting
off a CD in rescue mode, mount
The stupid build for this system has no sudo installed!
First thing I fix once I recover the password...
john has been running for 35 hrs.
On 11/21/2016 07:03 PM, fred roller wrote:
Is the user in the sudo group?
___
users mailing list -- users@lis
Is the user in the sudo group?
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
On Mon, 2016-11-21 at 13:12 -0800, Joe Zeff wrote:
> On 11/21/2016 01:06 PM, Robert Moskowitz wrote:
> >
> > Um, how to I get the REAL /etc/passwd file from the system when logged
> > in as a regular user? Yeah, I did things like this back in the days
> > before /etc/shadow, but since then...
>
On 11/21/2016 01:06 PM, Robert Moskowitz wrote:
Um, how to I get the REAL /etc/passwd file from the system when logged
in as a regular user? Yeah, I did things like this back in the days
before /etc/shadow, but since then...
Ah! I'd forgotten about that. Maybe copy both?
On 11/21/2016 03:54 PM, Joe Zeff wrote:
On 11/21/2016 12:25 PM, Robert Moskowitz wrote:
I have a running system that I have forgotten the root password. I
really do not want to take down the system, go through the steps to boot
up in single user mode and change the password.
I just happen to
On 11/21/2016 12:25 PM, Robert Moskowitz wrote:
I have a running system that I have forgotten the root password. I
really do not want to take down the system, go through the steps to boot
up in single user mode and change the password.
I just happen to have used the same password on a test syst
I have a running system that I have forgotten the root password. I
really do not want to take down the system, go through the steps to boot
up in single user mode and change the password.
I just happen to have used the same password on a test system, so I was
able to copy the /etc/passwd, edi
15 matches
Mail list logo