Sponsored Content
Full Discussion: Recover A password
Special Forums Cybersecurity Recover A password Post 2648 by Neo on Sunday 27th of May 2001 12:25:17 PM
Old 05-27-2001
The UNIX password encryption algorithm is a 'one way' mathematical function. 'One way' means there is encryption, but no decryption possible. As MIB and 98 say, the only way to search for passwords is to encrypt passwords and compare them to the encrypted string.

This is why picking simple dictionary words as passwords is weak, because password cracking programs use an internal dictionary to encrypt and compare.

One way passwords, BTW, has limited long term usefulness. With computing power and storage prices dropping, there will come a time in the near future when it is possible for people to encrypt all possible combinations (with the salt) and query the database directly with the encrypted string. With an 8 token limitation, this is becoming closer to reality each year.
 

10 More Discussions You Might Find Interesting

1. Solaris

Recover root password

I need to recover root password on a test server (E 10k) running solaris 9. Can someone please tell me how to do this? (1 Reply)
Discussion started by: nitinkgoud
1 Replies

2. Solaris

How to recover root password

How to recover root password in solaris, I forgot root password. thanks in advance (2 Replies)
Discussion started by: durgaprasadr13
2 Replies

3. Solaris

Need to recover 'root' password

Dear All, I have lost my data backup server's root password, just have a normal login username and password ..but i need to get back my root passwd....any1 can help me out plz :confused: (7 Replies)
Discussion started by: abir
7 Replies

4. Windows & DOS: Issues & Discussions

How to Recover windows administrator password?

HI, Can anybody tell me..about recovering windows administrator password in case of Forget it. Now in Unix OS and any database,there is a fascility of recovering root/admin password.... Can window provide any such kind of fascility?....Also tell me any other normal users password recovery... (5 Replies)
Discussion started by: jagdish.machhi@
5 Replies

5. Solaris

How to recover Admin password

Dear all I have two doubts please clarify my doubt with clear steps 1. As a admin i forget my password how could i know whats my password. 2. If someone change my password how could i rectify that Please give me reply. with clear steps (0 Replies)
Discussion started by: suneelieg
0 Replies

6. Solaris

Recover Admin Password

Dear All Users I have two doubts please any one clarify my doubts 1. In solaris As a admin i've forget my password so how could i know whats my password 2. if someone change my password so how could i rectify my password. Please can anyone solve my doubt with clear steps (2 Replies)
Discussion started by: suneelieg
2 Replies

7. Solaris

Recover root password

How can I recover root password :wall: 1) I am running Solaris 10 (X86) through VMware for practicing. 2) I was practicing root password recovery and deleted the password in /etc/shadow file. 3) Neither cant login the to the CLI nor Console 4) Selected the Soalris X86 failsafe in... (4 Replies)
Discussion started by: vijaykrishna
4 Replies

8. Red Hat

How to recover the root password?

Hello forum members, Please help me to recover the root password. i can login with the user in redhat linux but i forget root password. so pleas help me to recover. advance thanks siva. (2 Replies)
Discussion started by: workforsiva
2 Replies

9. UNIX for Dummies Questions & Answers

How to recover root password on SuSE?

Hi, We forgot the root password on SuSE version 10 server. Since I didn't have SuSE DVD, I started the server using Redhat. I updated /etc/shadow and removed the root password. I then started the server and I still can't login using root. Any idea? One more question, on Novell web... (6 Replies)
Discussion started by: samnyc
6 Replies

10. Forum Support Area for Unregistered Users & Account Problems

Unable to recover my password

Hi team, My Member Id is : 'Nila' and I forgot my password. I have tried to recover it from "Forgotten your password" link. But its not accepting my mail id which is valid. (nila.shanthi@gmail.com). Please help me to recover/change my password to login. Regards Vennila (1 Reply)
Discussion started by: Vennila
1 Replies
CHPASSWD(8)						    System Management Commands						       CHPASSWD(8)

NAME
chpasswd - update passwords in batch mode SYNOPSIS
chpasswd [options] DESCRIPTION
The chpasswd command reads a list of user name and password pairs from standard input and uses this information to update a group of existing users. Each line is of the format: user_name:password By default the passwords must be supplied in clear-text, and are encrypted by chpasswd. Also the password age will be updated, if present. The default encryption algorithm can be defined for the system with the ENCRYPT_METHOD or MD5_CRYPT_ENAB variables of /etc/login.defs, and can be overwitten with the -e, -m, or -c options. chpasswd first updates all the passwords in memory, and then commits all the changes to disk if no errors occured for any user. This command is intended to be used in a large system environment where many accounts are created at a single time. OPTIONS
The options which apply to the chpasswd command are: -c, --crypt-method METHOD Use the specified method to encrypt the passwords. The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods. By default (if none of the -c, -m, or -e options are specified), the encryption method is defined by the ENCRYPT_METHOD or MD5_CRYPT_ENAB variables of /etc/login.defs. -e, --encrypted Supplied passwords are in encrypted form. -h, --help Display help message and exit. -m, --md5 Use MD5 encryption instead of DES when the supplied passwords are not encrypted. -R, --root CHROOT_DIR Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory. -s, --sha-rounds ROUNDS Use the specified number of rounds to encrypt the passwords. The value 0 means that the system will choose the default number of rounds for the crypt method (5000). A minimal value of 1000 and a maximal value of 999,999,999 will be enforced. You can only use this option with the SHA256 or SHA512 crypt method. By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in /etc/login.defs. CAVEATS
Remember to set permissions or umask to prevent readability of unencrypted files by other users. CONFIGURATION
The following configuration variables in /etc/login.defs change the behavior of this tool: ENCRYPT_METHOD (string) This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line). It can take one of these values: DES (default), MD5, SHA256, SHA512. Note: this parameter overrides the MD5_CRYPT_ENAB variable. MD5_CRYPT_ENAB (boolean) Indicate if passwords must be encrypted using the MD5-based algorithm. If set to yes, new passwords will be encrypted using the MD5-based algorithm compatible with the one used by recent releases of FreeBSD. It supports passwords of unlimited length and longer salt strings. Set to no if you need to copy encrypted passwords to other systems which don't understand the new algorithm. Default is no. This variable is superseded by the ENCRYPT_METHOD variable or by any command line option used to configure the encryption algorithm. This variable is deprecated. You should use ENCRYPT_METHOD. SHA_CRYPT_MIN_ROUNDS (number), SHA_CRYPT_MAX_ROUNDS (number) When ENCRYPT_METHOD is set to SHA256 or SHA512, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line). With a lot of rounds, it is more difficult to brute forcing the password. But note also that more CPU resources will be needed to authenticate users. If not specified, the libc will choose the default number of rounds (5000). The values must be inside the 1000-999,999,999 range. If only one of the SHA_CRYPT_MIN_ROUNDS or SHA_CRYPT_MAX_ROUNDS values is set, then this value will be used. If SHA_CRYPT_MIN_ROUNDS > SHA_CRYPT_MAX_ROUNDS, the highest value will be used. FILES
/etc/passwd User account information. /etc/shadow Secure user account information. /etc/login.defs Shadow password suite configuration. SEE ALSO
passwd(1), newusers(8), login.defs(5), useradd(8). shadow-utils 4.1.5.1 05/25/2012 CHPASSWD(8)
All times are GMT -4. The time now is 01:10 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy