03-11-2008
Interpreting the encrypted shadow password?
We are currently using a script to copy the same encrypted password between our HP-UX and Solaris servers editing the trusted and shadow files directly. The encrypted password is only 13 characters long on both servers and decrypts the same way. Is there a way to copy this same string to Linux servers?
The encrypted password in the shadow file on one of our Linux servers looks like this:
1$9EmV.jZO$YyfdtPT11aP3hE.jqX7Ve0
I've read the crypt 3 man page but I am not sure how to intrepret it. Any idea if its possible to replace 13 characters in this string to decrypt the same password?
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
I do not want the plaintext password to appear in the netrc file. So I want to encrypt the password. Is there a way to encrypt the password and still make ftp to use the netrc ?
Thanks in advance.
-Gow:confused: (2 Replies)
Discussion started by: ggowrish
2 Replies
2. UNIX for Dummies Questions & Answers
I'm tasked to change a user's password on multiple Linux systems (RH v3). I though copying the encrypted password from one Linux /etc/shadow file to another would work but I was wrong.
The long term solution is to establish an openLDAP Directory service, but for now I'm stuck with a manual... (1 Reply)
Discussion started by: benq70
1 Replies
3. UNIX for Dummies Questions & Answers
Thanks
AVKlinux (11 Replies)
Discussion started by: avklinux
11 Replies
4. UNIX and Linux Applications
Actually in my application there is an XML file. The password and the user name for the database that I need to access the development box is stored there.
But using some UNIX command I am able to access the raw content of the file and not the decrypted code for that password. When I am applying... (3 Replies)
Discussion started by: nandumishra
3 Replies
5. Shell Programming and Scripting
Hi folks,
What will be the easy way to decrypt encrypted passwords on MySQL table. Googling brought me many suggestions on crypt/decrypt running scripts. Please advise. TIA
Remark:
I think the encrypt function of MySQL uses the Unix crypt command to encrypt
B.R.
satimis (1 Reply)
Discussion started by: satimis
1 Replies
6. UNIX for Advanced & Expert Users
Hi
I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ?
What kind of encryption is used in /etc/shadow file ?
ths for help. (1 Reply)
Discussion started by: presul
1 Replies
7. Shell Programming and Scripting
Hello friends,
We have encrypted password strings for all of our users (each user has different password).
After creating users in Linux, we replace encrypted passwords manually on /etc/shadow so that their passwords directly work. Instead we want to do it using scripting.
I tried with sed... (2 Replies)
Discussion started by: prvnrk
2 Replies
8. UNIX for Dummies Questions & Answers
i have an application that uses the encrypted password that's in the /etc/shadow file.
i copied the line for the particular username i was interested it in from shadow file and i pasted it into the password file of the application. the application is nagios.
this application allowed that... (5 Replies)
Discussion started by: SkySmart
5 Replies
9. Shell Programming and Scripting
How to keep encrypted password in a shell script.?
I have the file which has the following:
a.sh
-----
username=abc
password=abc
I will be using this username and password in another script. But I don't want to reveal the password in the script. How to keep the password... (3 Replies)
Discussion started by: sanvel
3 Replies
10. Cybersecurity
Hello, on my android device my app autosaves my password and it encrypts by TLS
im not politically exposed person, just regular entrepreneur. Should i worry if i loose my phone with TLS encrypted password? Or regular mortals or casual hackers are not able to crack it? (4 Replies)
Discussion started by: postcd
4 Replies
pwconv(1M) pwconv(1M)
NAME
pwconv - install, update or check the /etc/shadow file
SYNOPSIS
DESCRIPTION
The command installs or appends with information from or checks for any discrepancies between the contents of the two files.
The command without options does the following:
1. Creates the file if it does not exist; otherwise, it removes all entries for usernames which are not present in
2. For each entry in move the encrypted password and aging information to Entries in which have no encrypted password or aging
information will not overwrite information in
3. Writes an "x" in each password field of the file, to indicate that the password and aging information reside in the file.
The command relies on a special value of "x" in the password field of A value different from "x" will prompt to move the password and aging
information into the corresponding fields of and then replace the password field in with an "x".
If no aging information exists in for a user, none will be added to However, the last change field, which indicates when the password was
last modified, will always be updated (default is current date). See shadow(4).
Options
The following options are recognized:
Verbose output.
Test mode.
prints error information but does not modify nor
Notes
The command can only be used by the superuser.
HP recommends running before See pwck(1M).
A system which has been converted to a trusted system has no file. In this case, can be used with no options to update the secure password
facility to reflect any changes made in the file.
RETURN VALUE
exits with one of the following values:
Successful completion.
Conversion error occurred.
WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
FILES
system password file
shadow password file
secure password facility
SEE ALSO
pwck(1M), pwunconv(1M), passwd(4), shadow(4).
pwconv(1M)