Sponsored Content
Full Discussion: Recover A password
Special Forums Cybersecurity Recover A password Post 2575 by 98_1LE on Tuesday 22nd of May 2001 01:46:35 PM
Old 05-22-2001
i don't beleive there is a utility to do what you ask. There is a program(s) named crack that will attempt to crack the passwd, but it is an exhaustive password cracker and takes time and may not crack the encryption. Processes already running will not be affected by a passwd change. in fact, informix can be a locked user if the database is started by the rc scripts.
 

10 More Discussions You Might Find Interesting

1. Solaris

Recover root password

I need to recover root password on a test server (E 10k) running solaris 9. Can someone please tell me how to do this? (1 Reply)
Discussion started by: nitinkgoud
1 Replies

2. Solaris

How to recover root password

How to recover root password in solaris, I forgot root password. thanks in advance (2 Replies)
Discussion started by: durgaprasadr13
2 Replies

3. Solaris

Need to recover 'root' password

Dear All, I have lost my data backup server's root password, just have a normal login username and password ..but i need to get back my root passwd....any1 can help me out plz :confused: (7 Replies)
Discussion started by: abir
7 Replies

4. Windows & DOS: Issues & Discussions

How to Recover windows administrator password?

HI, Can anybody tell me..about recovering windows administrator password in case of Forget it. Now in Unix OS and any database,there is a fascility of recovering root/admin password.... Can window provide any such kind of fascility?....Also tell me any other normal users password recovery... (5 Replies)
Discussion started by: jagdish.machhi@
5 Replies

5. Solaris

How to recover Admin password

Dear all I have two doubts please clarify my doubt with clear steps 1. As a admin i forget my password how could i know whats my password. 2. If someone change my password how could i rectify that Please give me reply. with clear steps (0 Replies)
Discussion started by: suneelieg
0 Replies

6. Solaris

Recover Admin Password

Dear All Users I have two doubts please any one clarify my doubts 1. In solaris As a admin i've forget my password so how could i know whats my password 2. if someone change my password so how could i rectify my password. Please can anyone solve my doubt with clear steps (2 Replies)
Discussion started by: suneelieg
2 Replies

7. Solaris

Recover root password

How can I recover root password :wall: 1) I am running Solaris 10 (X86) through VMware for practicing. 2) I was practicing root password recovery and deleted the password in /etc/shadow file. 3) Neither cant login the to the CLI nor Console 4) Selected the Soalris X86 failsafe in... (4 Replies)
Discussion started by: vijaykrishna
4 Replies

8. Red Hat

How to recover the root password?

Hello forum members, Please help me to recover the root password. i can login with the user in redhat linux but i forget root password. so pleas help me to recover. advance thanks siva. (2 Replies)
Discussion started by: workforsiva
2 Replies

9. UNIX for Dummies Questions & Answers

How to recover root password on SuSE?

Hi, We forgot the root password on SuSE version 10 server. Since I didn't have SuSE DVD, I started the server using Redhat. I updated /etc/shadow and removed the root password. I then started the server and I still can't login using root. Any idea? One more question, on Novell web... (6 Replies)
Discussion started by: samnyc
6 Replies

10. Forum Support Area for Unregistered Users & Account Problems

Unable to recover my password

Hi team, My Member Id is : 'Nila' and I forgot my password. I have tried to recover it from "Forgotten your password" link. But its not accepting my mail id which is valid. (nila.shanthi@gmail.com). Please help me to recover/change my password to login. Regards Vennila (1 Reply)
Discussion started by: Vennila
1 Replies
pam_pwcheck(8)							 Reference Manual						    pam_pwcheck(8)

NAME
pam_pwcheck - PAM module for password strength checking DESCRIPTION
The pam_pwcheck is a PAM module for password strength checking. It makes additional checks upon password changes, but does not perform the change itself. It only provides functionality for one PAM management group: password changing. This module works in the following manner: if enabled, it first calls the Cracklib routine to check the strength of the password; if crack likes the password, the module does an additional set of strength checks. These checks are: Palindrome Is the new password a palindrome of the old one? Case Change Only Is the new password the old one with only a change of case? Similar Is the new password too similar to old one? Simple Is the new password too short? Rotated Is the new password a rotated version of the old password? Already used Was the password used in the past? Previously used passwords are to be found in /etc/security/opasswd. OPTIONS
The following options may be passed to the module: cracklib=<path to dictionaries> Use cracklib library for password checks. This parameter also contains the path to the cracklib dictionaries. The default is /usr/lib/cracklib_dict. debug A lot of debug information is printed with syslog(3). maxlen=number Number of significant characters in the password for crypt(3). A value of zero suppresses this check. The default is 0. minlen=number The minimum number of characters in an acceptable password. A new password with fewer characters will be rejected. A value of zero suppresses this check. The default is 5. no_obscure_checks No additional checks will be performed before a new password is accepted. Since the checks performed are fairly simple, their usage is recommended. not_set_pass If this option is given, pam_pwcheck will not make the new password available for other modules. nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option you can allow the user to change his password for such accounts. This option does not overwrite a hardcoded default by the calling process. tries=number Maximum number of attempts to change a password if the new ones are rejected because they are too easy. use_authtok Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_pwcheck will ask the user for the new password. use_first_pass By default pam_pwcheck tries to get the authentication token from a previous module. If no token is available, the user is asked for the old password. With this option, pam_pwcheck aborts with an error if no authentication token from a previous module is available. remember=XX Remember the last XX passwords and do not allow the user to reuse any of these for the next XX password changes. XX is a number between 1 and 400. enforce_for_root If this option is set, most of the password check rules are enforced for root, too. Never use this option if you don't know what you are doing, since it could be as result that root is no longer allowed to login at all. FILES
/etc/security/opasswd SEE ALSO
passwd(1), pam.conf(8), pam.d(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1) pam_pwcheck September 2008 pam_pwcheck(8)
All times are GMT -4. The time now is 03:33 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy