Sponsored Content
Operating Systems OS X (Apple) Mac OS X Tiger Password Storage Post 302319562 by Ricardo-san on Monday 25th of May 2009 05:48:31 PM
Old 05-25-2009
Mac OS X Tiger Password Storage

Are Mac OS X 10.4.11 Tiger passwords only stored in /var/db/shadow/hash? Or is it also used in NetInfo?
The reason I am asking is because I wonder if I edit the file in /var/db/shadow/hash and replace the hash inside with my own, will it change the password?
Thanks.
 

4 More Discussions You Might Find Interesting

1. News, Links, Events and Announcements

Mac OS X - Tiger - Meet the world’s most advanced operating system.

Tiger Unleased Advanced UNIX-Based Technology (0 Replies)
Discussion started by: Neo
0 Replies

2. OS X (Apple)

UNIX executables on Mac OS X Tiger

Question: Can I run a UNIX executable on Mac OS X Tiger? If so, how is it done? Background: I FTP'd my schools UNIX server some C++ code and header files. Then I used Telnet to get g++ to compile them. I then FTP'd the UNIX executable back to my PowerBook G4. I've already... (4 Replies)
Discussion started by: thorninc
4 Replies

3. UNIX for Dummies Questions & Answers

Installing gdm on mac os x tiger

I was installing gdm on the terminal application and my ISP disconnected. When I reconnected and tried to continue the installation, I got the following message: Waiting for lock on... (0 Replies)
Discussion started by: adrianzen
0 Replies

4. UNIX for Dummies Questions & Answers

Mac OS X Password

I want to know the exact process of how Mac OS X takes a string(password) and encrypts it. I know the encrypted file is stored in /var/db/shadow/hash/<GUID> But.. 1) How does the string get to that point? 2) How can I write a script that can do this so i can encrypt my password, compare it... (0 Replies)
Discussion started by: cbreiny
0 Replies
MOKUTIL(1)						      General Commands Manual							MOKUTIL(1)

NAME
mokutil - utility to manipulate machine owner keys SYNOPSIS
mokutil [--list-enrolled] mokutil [--list-new] mokutil [--list-delete] mokutil [--import keylist| -i keylist] ([--hash-file hashfile | -f hashfile] | [--root-pw | -P] | [--simple-hash | -s]) mokutil [--delete keylist | -d keylist] ([--hash-file hashfile | -f hashfile] | [--root-pw | -P] | [--simple-hash | -s]) mokutil [--revoke-import] mokutil [--revoke-delete] mokutil [--export | -x] mokutil [--password | -p] ([--hash-file hashfile | -f hashfile] | [--root-pw | -P] | [--simple-hash | -s]) mokutil [--clear-password | -c] ([--simple-hash | -s]) mokutil [--disable-validation] mokutil [--enable-validation] mokutil [--sb-state] mokutil [--test-key | -t] ... mokutil [--reset] ([--hash-file hashfile | -f hashfile] | [--root-pw | -P] | [--simple-hash | -s]) mokutil [--generate-hash=password | -gpassword] DESCRIPTION
mokutil is a tool to import or delete the machines owner keys (MOK) stored in the database of shim. OPTIONS
--list-enrolled List the keys the already stored in the database --list-new List the keys to be enrolled --list-delete List the keys to be deleted --import Collect the followed files and form a request to shim. The files must be in DER format. --revoke-import Revoke the current import request (MokNew) --revoke-delete Revoke the current delete request (MokDel) --export Export the keys stored in MokListRT --password Setup the password for MokManager (MokPW) --clear-password Clear the password for MokManager (MokPW) --disable-validation Disable the validation process in shim --enrolled-validation Enable the validation process in shim --sb-state Show SecureBoot State --test-key Test if the key is enrolled or not --reset Reset MOK list --generate-hash Generate the password hash --hash-file Use the password hash from a specific file --root-pw Use the root password hash from /etc/shadow --simple-hash Use the old SHA256 password hash method to hash the password Note: --root-pw invalidates --simple-hash Thu Jul 25 2013 MOKUTIL(1)
All times are GMT -4. The time now is 04:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy