02-15-2006
Though it is not recommended and banned in this forum ...
... you could search and try exploits, 4.3 is pretty old and should not be hard to crack
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I've forgotten root password on one of Solaris machines, i searched in forumes to find a similar case but there's no proceudre here to reinintialize root password, cause most of related commands & even single user mode needs root password that i don't have.
Any solution would be helpful.
--rgrds,... (9 Replies)
Discussion started by: nikk
9 Replies
2. UNIX for Advanced & Expert Users
Hello ...
I lost my password root !
maybe someone can to help me to log in HP_UX,
i started the server in " Singel - User" and i changed my
password to new password and it`s not working ..
what i must to do ??? (4 Replies)
Discussion started by: yanly
4 Replies
3. UNIX for Advanced & Expert Users
I have recently become the sys adm guy for our unix systems here for my shop. I have a pretty good understanding of the system, but there is just some stuff that I don't know. Right now one of those things is to recover the password for a unix system.
I know that there is a way that you can use... (2 Replies)
Discussion started by: GlockCW
2 Replies
4. Answers to Frequently Asked Questions
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies
5. Linux
wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies
6. UNIX for Dummies Questions & Answers
I'm attempting to blank out the root user password on a machine that we have forgotten the password for. I have been using the advice posted on this site to boot from CDROM in single user mode, then mounting the root slice and editing the /etc/shadow file. Each time I save the shadow file and... (1 Reply)
Discussion started by: gonzotonka
1 Replies
7. UNIX for Advanced & Expert Users
This is a common question im sure... I bought a RS/6000 Model 240. Aix 4.3.3 loaded. No root password was supplied to me, but I do have the install media (4 disks). I want to drop into maint mode. So I place the cd into the drive, restart the box ( by pressing the power button, since i do not have... (3 Replies)
Discussion started by: JoeJohnSmith
3 Replies
8. SCO
I dont have the cds, what can i do? (2 Replies)
Discussion started by: sopapa
2 Replies
9. UNIX for Dummies Questions & Answers
Hi guys,
we have "forget" the root password for 1 of our AIX machines,
how can we reset it? or recover it??
Thanks (1 Reply)
Discussion started by: prpkrk
1 Replies
10. Solaris
Hi All
Hope it's okay to post on this sub-forum, couldn't find a better place
I've got a 480R running solaris 8 with veritas volume manager managing all filesystems, including an encapsulated root disk (I believe the root disk is encapsulated as one of the root mirror disks has an entry under... (1 Reply)
Discussion started by: sunnyd76
1 Replies
LEARN ABOUT DEBIAN
fascistcheck
FascistCheck(3) Debian GNU/Linux manual FascistCheck(3)
NAME
FascistCheck - a pro-active password checker library
SYNOPSIS
#include <crack.h>
static char const CRACKLIB_DICTPATH[] = ...;
extern char const *
FascistCheck(char const passwd[], char const dictpath[]);
DESCRIPTION
cracklib is a library containing the FascistCheck C function which may be used in a "passwd" like program. The idea is simple: try to pre-
vent users from choosing passwords that could be guessed by "crack" by filtering them out, at source. cracklib is an offshoot of the the
version 5 of the "crack" software and contains a considerable number of ideas nicked from the new software.
The first formal argument password is the potential password. The second formal argument dictpath is the full path name + filename prefix
of the cracklib dictionary database. FascistCheck returns the NULL pointer for a good password, or a pointer to a diagnostic string if it
is a weak password.
The database is in a binary format generated by the utilities crack_mkdict(8) and crack_packer(8). On a Debian system the database is
located in the directory defined by the static constant CRACKLIB_DICTPATH and is set to /var/cache/cracklib/cracklib_dict. None of the
subroutines in the cracklib libraries have this location hard-coded into their implementations. It is generated daily with the program
/etc/cron.daily/cracklib.
FILES
/var/cache/cracklib/cracklib_dict.[hwm|pwd|pwi]
cracklib dictionary database files used by utilities.
/etc/cron.daily/cracklib
cracklib daily cron program to rebuild the cracklib dictionary database.
/etc/cracklib/cracklib.conf
cracklib configuration file used by the cracklib daily cron program to rebuild the cracklib dictionary database.
/usr/sbin/crack_mkdict
cracklib shell script to create initial list of words for dictionary database.
/usr/share/doc/cracklib2-dev/examples
Example cc(1) source files that show how FascistCheck is used.
SEE ALSO
crack_teststr(8), crack_mkdict(8), update-cracklib(8)
/usr/share/doc/cracklib2-dev/examples
/usr/share/doc/cracklib2/cracklib2.html
/usr/share/doc/cracklib2-dev/cracklib2-dev.html
AUTHOR
cracklib2 is written by Alec Muffett <alecm@crypto.dircon.co.uk>. Manual added by Jean Pierre LeJacq <jplejacq@quoininc.com>.
2.7-8.5 Wed, 3 Oct 2001 01:37:09 +0100 FascistCheck(3)