05-22-2001
i don't beleive there is a utility to do what you ask. There is a program(s) named crack that will attempt to crack the passwd, but it is an exhaustive password cracker and takes time and may not crack the encryption. Processes already running will not be affected by a passwd change. in fact, informix can be a locked user if the database is started by the rc scripts.
10 More Discussions You Might Find Interesting
1. Solaris
I need to recover root password on a test server (E 10k) running solaris 9. Can someone please tell me how to do this? (1 Reply)
Discussion started by: nitinkgoud
1 Replies
2. Solaris
How to recover root password in solaris, I forgot root password.
thanks in advance (2 Replies)
Discussion started by: durgaprasadr13
2 Replies
3. Solaris
Dear All,
I have lost my data backup server's root password, just have a normal login username and password ..but i need to get back my root passwd....any1 can help me out plz :confused: (7 Replies)
Discussion started by: abir
7 Replies
4. Windows & DOS: Issues & Discussions
HI,
Can anybody tell me..about recovering windows administrator password in case of Forget it.
Now in Unix OS and any database,there is a fascility of recovering root/admin password....
Can window provide any such kind of fascility?....Also tell me any other normal users password recovery... (5 Replies)
Discussion started by: jagdish.machhi@
5 Replies
5. Solaris
Dear all
I have two doubts please clarify my doubt with clear steps
1. As a admin i forget my password how could i know whats my password.
2. If someone change my password how could i rectify that
Please give me reply. with clear steps (0 Replies)
Discussion started by: suneelieg
0 Replies
6. Solaris
Dear All Users
I have two doubts please any one clarify my doubts
1. In solaris As a admin i've forget my password so how could i know whats my password
2. if someone change my password so how could i rectify my password.
Please can anyone solve my doubt with clear steps (2 Replies)
Discussion started by: suneelieg
2 Replies
7. Solaris
How can I recover root password :wall:
1) I am running Solaris 10 (X86) through VMware for practicing.
2) I was practicing root password recovery and deleted the password in /etc/shadow file.
3) Neither cant login the to the CLI nor Console
4) Selected the Soalris X86 failsafe in... (4 Replies)
Discussion started by: vijaykrishna
4 Replies
8. Red Hat
Hello forum members,
Please help me to recover the root password. i can login with the user in redhat linux but i forget root password. so pleas help me to recover.
advance thanks
siva. (2 Replies)
Discussion started by: workforsiva
2 Replies
9. UNIX for Dummies Questions & Answers
Hi,
We forgot the root password on SuSE version 10 server. Since I didn't have SuSE DVD, I started the server using Redhat. I updated /etc/shadow and removed the root password.
I then started the server and I still can't login using root. Any idea?
One more question, on Novell web... (6 Replies)
Discussion started by: samnyc
6 Replies
10. Forum Support Area for Unregistered Users & Account Problems
Hi team,
My Member Id is : 'Nila' and I forgot my password. I have tried to recover it from "Forgotten your password" link. But its not accepting my mail id which is valid. (nila.shanthi@gmail.com).
Please help me to recover/change my password to login.
Regards
Vennila (1 Reply)
Discussion started by: Vennila
1 Replies
LEARN ABOUT CENTOS
cracklib
FascistCheck(3) Debian GNU/Linux manual FascistCheck(3)
NAME
FascistCheck - a pro-active password checker library
SYNOPSIS
#include <crack.h>
static char const CRACKLIB_DICTPATH[] = ...;
extern char const *
FascistCheck(char const passwd[], char const dictpath[]);
DESCRIPTION
cracklib is a library containing the FascistCheck C function which may be used in a "passwd" like program. The idea is simple: try to pre-
vent users from choosing passwords that could be guessed by "crack" by filtering them out, at source. cracklib is an offshoot of the the
version 5 of the "crack" software and contains a considerable number of ideas nicked from the new software.
The first formal argument password is the potential password. The second formal argument dictpath is the full path name + filename prefix
of the cracklib dictionary database. FascistCheck returns the NULL pointer for a good password, or a pointer to a diagnostic string if it
is a weak password.
The database is in a binary format generated by the utilities crack_mkdict(8) and crack_packer(8). On a Debian system the database is
located in the directory defined by the static constant CRACKLIB_DICTPATH and is set to /var/cache/cracklib/cracklib_dict. None of the
subroutines in the cracklib libraries have this location hard-coded into their implementations. It is generated daily with the program
/etc/cron.daily/cracklib.
FILES
/var/cache/cracklib/cracklib_dict.[hwm|pwd|pwi]
cracklib dictionary database files used by utilities.
/etc/cron.daily/cracklib
cracklib daily cron program to rebuild the cracklib dictionary database.
/etc/cracklib/cracklib.conf
cracklib configuration file used by the cracklib daily cron program to rebuild the cracklib dictionary database.
/usr/sbin/crack_mkdict
cracklib shell script to create initial list of words for dictionary database.
/usr/share/doc/cracklib2-dev/examples
Example cc(1) source files that show how FascistCheck is used.
SEE ALSO
crack_teststr(8), crack_mkdict(8), update-cracklib(8)
/usr/share/doc/cracklib2-dev/examples
/usr/share/doc/cracklib2/cracklib2.html
/usr/share/doc/cracklib2-dev/cracklib2-dev.html
AUTHOR
cracklib2 is written by Alec Muffett <alecm@crypto.dircon.co.uk>. Manual added by Jean Pierre LeJacq <jplejacq@quoininc.com>.
2.7-8.5 Wed, 3 Oct 2001 01:37:09 +0100 FascistCheck(3)