08-30-2008
Sorry to disturb you again, Incredible. I want to make sure that I understand it correctly.
If shadow file say
john:1$1GFvVgvgus657vYF:::::: >> this is show the hashed password.
abel:123abc::::::: >> this should mean someone edit the shadow file and replace hashed password with 123abc.
well.. I still doubt that why they need to edit it to 123abc ??? are there any myth hidden behind?
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Does anyone know how to remove a stanza in the shadow password file if the user account has already been removed on an AIX box? I know it can be done by editing the file itself but I would prefer not to do it that way.
cheers
gizaa (2 Replies)
Discussion started by: gizaa
2 Replies
2. UNIX for Dummies Questions & Answers
hi,
I had to reset a lost root password by editing the /etc/passwd and /etc/shadow files ( this is a xen vm file, so i mounted and chrooted the file )
after the reboot with an empty password on root , i have set a new password with passwd but
it only changed the /etc/passwd file.... (0 Replies)
Discussion started by: progressdll
0 Replies
3. Linux
We are currently using a script to copy the same encrypted password between our HP-UX and Solaris servers editing the trusted and shadow files directly. The encrypted password is only 13 characters long on both servers and decrypts the same way. Is there a way to copy this same string to Linux... (5 Replies)
Discussion started by: keelba
5 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I am new to shell programming and trying to write a command that would show the etc/shadow file but without the hashes. So, something like this:
root: <HASH PASSWORD FOUND BUT OBFUSCATED>
daemon: NP
bin: NP
sys: NP
If there is a... (2 Replies)
Discussion started by: hellomms
2 Replies
5. Linux
Hey guys,
i've got some serious problems creating a hash for the /etc/shadow. I try to understand how linux creates this hash. Till now i understood that the $6$ shows me that my ubuntu 9.10 uses sha512 to create the hash. I also understood that the "salt"-thing makes the whole think much more... (2 Replies)
Discussion started by: Sebi0815
2 Replies
6. UNIX for Advanced & Expert Users
Hi
I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ?
What kind of encryption is used in /etc/shadow file ?
ths for help. (1 Reply)
Discussion started by: presul
1 Replies
7. Red Hat
Today i was going through some of security guides written on linux .
Under shadow file security following points were mentioned.
1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.
2)Usernames in shadow file must satisfy to all the same rules as... (14 Replies)
Discussion started by: pinga123
14 Replies
8. UNIX for Dummies Questions & Answers
I am trying to use John the Ripper but it doesn't take regular MD5 hashes, only shadow MD5 hashes. For example this hash: 900150983cd24fb0d6963f7d28e17f72 (which, decrypted, is 'abc') within a text file, John the Ripper does not detect because it is not in shadow format. How can I convert this MD5... (2 Replies)
Discussion started by: guitarscn
2 Replies
9. Shell Programming and Scripting
Hello,
I have to do a script which returns users who have never changed their password from /etc/shadow.
Here is what have I done and I'm not sure if it's ok.
I tried to return just users who doesn;t have password set or are locked.
Can be there other kind of user who never changed the... (3 Replies)
Discussion started by: catalint
3 Replies
pwconv(8) System Manager's Manual pwconv(8)
NAME
pwconv - convert to shadow account
SYNOPSIS
pwconv [-P path]
DESCRIPTION
pwconv installs and updates /etc/shadow with information from /etc/passwd. It relies on the special password 'x' in the password field of
the account. This value indicates that the password for the user is already in /etc/shadow and should not be modified.
If /etc/shadow does not exist, pwconv creates this file, moves the user password to it and creates default aging informations with the help
of the values of PASS_MIN_DAYS, PASS_MAX_DAYS and PASS_WARN_AGE from /etc/login.defs. The password field in /etc/passwd is replaced with
the special character 'x'.
If the /etc/shadow does exist, entries that are in the /etc/passwd file and not in the /etc/shadow file are added to the /etc/shadow file.
Accounts, which only exist in /etc/passwd, are added to /etc/shadow. Entries that are in /etc/shadow and not in /etc/passwd are removed
from /etc/shadow. All passwords from /etc/passwd are moved to /etc/shadow and replaced with the special character 'x'.
pwconv can be used for initial conversion and for updates later.
OPTIONS
-P, --path path
The passwd and shadow files are located below the specified directory path. pwconv will use this files, not /etc/passwd and
/etc/shadow.
FILES
passwd - user account information
shadow - shadow user account information
SEE ALSO
passwd(1), login.defs(5), passwd(5), shadow(5), pwck(8), pwunconv(8)
AUTHOR
Thorsten Kukuk <kukuk@suse.de>
pwdutils January 2004 pwconv(8)