How would he actually use this, though? If the script didn't contain a password for the password, it would have to ask for one every time. And if it did contain a password for the password, it would decrypt itself for the hacker's convenience just by running it.
And either way, it's still unprotected from interception before it gets sent to the shell.
I have a faint glimmer of an idea which involves an ssh server set up somewhere just to serve keys... But in the end, it always comes down to running the code somewhere else.
Last edited by Corona688; 01-23-2014 at 11:08 AM..
Hi,
I do not want the plaintext password to appear in the netrc file. So I want to encrypt the password. Is there a way to encrypt the password and still make ftp to use the netrc ?
Thanks in advance.
-Gow:confused: (2 Replies)
I'm tasked to change a user's password on multiple Linux systems (RH v3). I though copying the encrypted password from one Linux /etc/shadow file to another would work but I was wrong.
The long term solution is to establish an openLDAP Directory service, but for now I'm stuck with a manual... (1 Reply)
I have a Solaris 5.9 server and need send information via SFTP automaticaly, and set my username and password encrypted. How can I do this?
Best regards (1 Reply)
We are currently using a script to copy the same encrypted password between our HP-UX and Solaris servers editing the trusted and shadow files directly. The encrypted password is only 13 characters long on both servers and decrypts the same way. Is there a way to copy this same string to Linux... (5 Replies)
Actually in my application there is an XML file. The password and the user name for the database that I need to access the development box is stored there.
But using some UNIX command I am able to access the raw content of the file and not the decrypted code for that password. When I am applying... (3 Replies)
Hi folks,
What will be the easy way to decrypt encrypted passwords on MySQL table. Googling brought me many suggestions on crypt/decrypt running scripts. Please advise. TIA
Remark:
I think the encrypt function of MySQL uses the Unix crypt command to encrypt
B.R.
satimis (1 Reply)
Hi
I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ?
What kind of encryption is used in /etc/shadow file ?
ths for help. (1 Reply)
i have an application that uses the encrypted password that's in the /etc/shadow file.
i copied the line for the particular username i was interested it in from shadow file and i pasted it into the password file of the application. the application is nagios.
this application allowed that... (5 Replies)
Hello, on my android device my app autosaves my password and it encrypts by TLS
im not politically exposed person, just regular entrepreneur. Should i worry if i loose my phone with TLS encrypted password? Or regular mortals or casual hackers are not able to crack it? (4 Replies)
Discussion started by: postcd
4 Replies
LEARN ABOUT ULTRIX
su
su(1) General Commands Manual su(1)Name
su - substitute a user ID
Syntax
su [username]
su - [username]
su -f [username]
Description
The command requests the password of the specified username. If the correct password is given, changes to that username without changing
the current directory. The user environment is unchanged except for HOME and SHELL which are taken from the password file entry for user-
name. The shell that is run is also taken from the password file entry for username. The new user ID stays in force until the shell
exits.
If no username is specified, `root' is assumed. To remind the superuser of his responsibilities, the shell substitutes `#' for its usual
prompt.
Options-f Prevents from executing the .cshrc file, making start up faster.
- Simulates a full login.
Diagnostics
Sorry
An invalid password was supplied for the specified username.
Unknown login: username
The specified username was not found in the passwd database.
No directory
The home directory for the username is not accessible at this time (only with ``-'' argument).
No shell
The shell specified in the passwd database entry for username could not be executed.
Kerberos initialization failure
Consult your system administrator.
If enhanced security features are enabled the following error messages are also possible:
Requires secure terminal
Attempt to su to UID 0 on a line that is not marked secure in
User's password has expired
Access is denied because the password for username is expired.
This account is disabled
Access is denied because the auth entry corresponding to username is marked disabled.
Files
Log file of anyone who became
root, with a date mark.
See Alsocsh(1), sh(1), passwd(5yp), environ(7), edauth(8)
Security Guide for Administrators
Security Guide for Users
su(1)