Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Shadow file encryption method Post 302290282 by abir on Sunday 22nd of February 2009 11:25:14 PM
Old 02-23-2009
Is there any way to get back clear text password from /etc/shadow encrypted data ??
 

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

which encryption method?

hello ppl, i've been coding a perl script for xchat and i need to store the nick's passwords. i was wondering which encryption to use. picture this situation: i've got a system flaw and some guy hacks the machine and gets his hands on the passwd file; he has access to the script. what encryption... (2 Replies)
Discussion started by: crashnburn
2 Replies

2. UNIX for Dummies Questions & Answers

shadow file

Sirs, What is a shadow file,How it be usefull.For my project i have to keep the password in shawdow file also i am doing in php how can i do it. Thanks in advance, ArunKumar (3 Replies)
Discussion started by: arunkumar_mca
3 Replies

3. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

4. Solaris

*LK* in /etc/shadow file

my etc/shadow file showing *LK* for a particular user.. can u tell me under which circumstances a user is locked (5 Replies)
Discussion started by: vikashtulsiyan
5 Replies

5. UNIX for Advanced & Expert Users

/etc/shadow file....

Does anyone know what "!!" represents in the password field of the /etc/shadow file? :confused: (6 Replies)
Discussion started by: avcert1998
6 Replies

6. UNIX for Dummies Questions & Answers

Shadow File

I see conflicting definitions for the shadow file. For Solaris, what are the fields please? Thanks. (3 Replies)
Discussion started by: DavidS
3 Replies

7. Shell Programming and Scripting

Shadow file

Hi, In shadow file smithj:Ep6mckrOLChF.:10063:0:99999:7::: 3rd Field 10063 indicates the number of days (since January 1, 1970) since the password was last changed. I want to get the result with script the date on which the password was last changed in YYYY-MM-DD format. can... (8 Replies)
Discussion started by: pinnacle
8 Replies

8. UNIX for Dummies Questions & Answers

Shadow file help

As a part of linux hardening In shadow file all Application accounts which are not locked must contain only an asterisk “*” in the Passwd field. But how would i do it by using command? Is there any way other than modifying shadow file to accomplish this task? (3 Replies)
Discussion started by: pinga123
3 Replies

9. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
pwconv(1M)																pwconv(1M)

NAME
pwconv - install, update or check the /etc/shadow file SYNOPSIS
DESCRIPTION
The command installs or appends with information from or checks for any discrepancies between the contents of the two files. The command without options does the following: 1. Creates the file if it does not exist; otherwise, it removes all entries for usernames which are not present in 2. For each entry in move the encrypted password and aging information to Entries in which have no encrypted password or aging information will not overwrite information in 3. Writes an "x" in each password field of the file, to indicate that the password and aging information reside in the file. The command relies on a special value of "x" in the password field of A value different from "x" will prompt to move the password and aging information into the corresponding fields of and then replace the password field in with an "x". If no aging information exists in for a user, none will be added to However, the last change field, which indicates when the password was last modified, will always be updated (default is current date). See shadow(4). Options The following options are recognized: Verbose output. Test mode. prints error information but does not modify nor Notes The command can only be used by the superuser. HP recommends running before See pwck(1M). A system which has been converted to a trusted system has no file. In this case, can be used with no options to update the secure password facility to reflect any changes made in the file. RETURN VALUE
exits with one of the following values: Successful completion. Conversion error occurred. WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality. FILES
system password file shadow password file secure password facility SEE ALSO
pwck(1M), pwunconv(1M), passwd(4), shadow(4). pwconv(1M)
All times are GMT -4. The time now is 01:29 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy