Sponsored Content
Operating Systems Solaris hash password in shadow show 'x' ??? Post 302230709 by incredible on Sunday 31st of August 2008 04:38:35 AM
Old 08-31-2008
Nope, the abc123 is not a password and will never work. somebody probably could have "just editted" it to prevent the user from not logging in again I guess, that's all. Anyway, it would be the wrong way to do so. Never ever attempt to edit the passwd/shadow files by hand, unless you are sure ofno typo mistakes and you're aware of what you're doing.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

remove shadow password

Does anyone know how to remove a stanza in the shadow password file if the user account has already been removed on an AIX box? I know it can be done by editing the file itself but I would prefer not to do it that way. cheers gizaa (2 Replies)
Discussion started by: gizaa
2 Replies

2. UNIX for Dummies Questions & Answers

shadow file after a password reset

hi, I had to reset a lost root password by editing the /etc/passwd and /etc/shadow files ( this is a xen vm file, so i mounted and chrooted the file ) after the reboot with an empty password on root , i have set a new password with passwd but it only changed the /etc/passwd file.... (0 Replies)
Discussion started by: progressdll
0 Replies

3. Linux

Interpreting the encrypted shadow password?

We are currently using a script to copy the same encrypted password between our HP-UX and Solaris servers editing the trusted and shadow files directly. The encrypted password is only 13 characters long on both servers and decrypts the same way. Is there a way to copy this same string to Linux... (5 Replies)
Discussion started by: keelba
5 Replies

4. UNIX for Dummies Questions & Answers

etc/shadow without hash

Hi, I am new to shell programming and trying to write a command that would show the etc/shadow file but without the hashes. So, something like this: root: <HASH PASSWORD FOUND BUT OBFUSCATED> daemon: NP bin: NP sys: NP If there is a... (2 Replies)
Discussion started by: hellomms
2 Replies

5. Linux

How to generate the hash in /etc/shadow

Hey guys, i've got some serious problems creating a hash for the /etc/shadow. I try to understand how linux creates this hash. Till now i understood that the $6$ shows me that my ubuntu 9.10 uses sha512 to create the hash. I also understood that the "salt"-thing makes the whole think much more... (2 Replies)
Discussion started by: Sebi0815
2 Replies

6. UNIX for Advanced & Expert Users

/etc/shadow encrypted password

Hi I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ? What kind of encryption is used in /etc/shadow file ? ths for help. (1 Reply)
Discussion started by: presul
1 Replies

7. Red Hat

Shadow file password policy

Today i was going through some of security guides written on linux . Under shadow file security following points were mentioned. 1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters. 2)Usernames in shadow file must satisfy to all the same rules as... (14 Replies)
Discussion started by: pinga123
14 Replies

8. UNIX for Dummies Questions & Answers

How to convert MD5 hash into shadow format?

I am trying to use John the Ripper but it doesn't take regular MD5 hashes, only shadow MD5 hashes. For example this hash: 900150983cd24fb0d6963f7d28e17f72 (which, decrypted, is 'abc') within a text file, John the Ripper does not detect because it is not in shadow format. How can I convert this MD5... (2 Replies)
Discussion started by: guitarscn
2 Replies

9. Shell Programming and Scripting

Users who have never changed their password from /etc/shadow.

Hello, I have to do a script which returns users who have never changed their password from /etc/shadow. Here is what have I done and I'm not sure if it's ok. I tried to return just users who doesn;t have password set or are locked. Can be there other kind of user who never changed the... (3 Replies)
Discussion started by: catalint
3 Replies
VIPW(8) 						    System Management Commands							   VIPW(8)

NAME
vipw, vigr - edit the password, group, shadow-password or shadow-group file SYNOPSIS
vipw [options] vigr [options] DESCRIPTION
The vipw and vigr commands edits the files /etc/passwd and /etc/group, respectively. With the -s flag, they will edit the shadow versions of those files, /etc/shadow and /etc/gshadow, respectively. The programs will set the appropriate locks to prevent file corruption. When looking for an editor, the programs will first try the environment variable $VISUAL, then the environment variable $EDITOR, and finally the default editor, vi(1). OPTIONS
The options which apply to the vipw and vigr commands are: -g, --group Edit group database. -h, --help Display help message and exit. -p, --passwd Edit passwd database. -q, --quiet Quiet mode. -s, --shadow Edit shadow or gshadow database. ENVIRONMENT
VISUAL Editor to be used. EDITOR Editor to be used if VISUAL is not set. FILES
/etc/group Group account information. /etc/gshadow Secure group account information. /etc/passwd User account information. /etc/shadow Secure user account information. SEE ALSO
vi(1), group(5), gshadow(5) , passwd(5), , shadow(5). System Management Commands 06/24/2011 VIPW(8)
All times are GMT -4. The time now is 03:42 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy