10-24-2018
You'll need the expect tool to bruteforce a username and password in such an insecure manner.
That they've explicitly banned all the sensible options for automation, however, suggests to me that they really, really, really don't want automation to happen.
10 More Discussions You Might Find Interesting
1. Answers to Frequently Asked Questions
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies
2. Linux
wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies
3. UNIX for Dummies Questions & Answers
Hi folks,
I'm trying to install a program, and I want to place some of the executables into /usr/bin so that they can be executed from any folder on the computer. I've been giveng the root password, but told never to log in directly as root. Instead, I can wait for a password prompt. However, I... (2 Replies)
Discussion started by: lunchtime
2 Replies
4. UNIX for Advanced & Expert Users
Hello. I searched the internet for answers and don't seem to find any for about a day now.
My problem. I want to su to a non-root account non-interactively, e.g. if I want to temporarily become prdusr, I want to su prdusr without keying prdusr's password every time.
What I want is... (10 Replies)
Discussion started by: royale-sojin
10 Replies
5. Shell Programming and Scripting
Hi Friends.
I am new to scripting now i want to change the root password using the script with standard password.
which is the easy scripting to learn for the beginner, Thanks in advance. (2 Replies)
Discussion started by: kurva
2 Replies
6. Solaris
Hello All,
I have several solaris boxes running Solaris 8. When changing root passwords on them, all will simply ask for the new root password to change and of course to re-type the new password. One of the systems however asks for the existing root password before it will display the new password... (8 Replies)
Discussion started by: tferrazz
8 Replies
7. Shell Programming and Scripting
I have several clients (over 120) connected to my server. I want to push some patch to all the client using a script which copies the file from the server to a specific path on the client and then installs it.
But for installation of the patch, it needs to be done thorough root login on client.... (7 Replies)
Discussion started by: shahdeo
7 Replies
8. Solaris
Hi All
Hope it's okay to post on this sub-forum, couldn't find a better place
I've got a 480R running solaris 8 with veritas volume manager managing all filesystems, including an encapsulated root disk (I believe the root disk is encapsulated as one of the root mirror disks has an entry under... (1 Reply)
Discussion started by: sunnyd76
1 Replies
9. Ubuntu
We are having a little problem on a server. We want that some users should be able to do e.g. sudo and become root, but with the restriction that the user can't change root password. That is, a guarantee that we still can login to that server and become root no matter of what the other users will... (2 Replies)
Discussion started by: 244an
2 Replies
10. UNIX for Beginners Questions & Answers
i do not have root on a solairs 10 server , however i do have the root role, i was wondering if I can change the root password as a a role with the passwd command? I have not tried yet.
and do i have to use the # chgkey -p afterwards?
i need to patch is why i am asking.
thanks (1 Reply)
Discussion started by: goya
1 Replies
LEARN ABOUT MOJAVE
pwd_mkdb
PWD_MKDB(8) BSD System Manager's Manual PWD_MKDB(8)
NAME
pwd_mkdb -- generate the password databases
SYNOPSIS
pwd_mkdb [-c] [-p | -s] [-d directory] [-u username] file
DESCRIPTION
pwd_mkdb creates db(3) style secure and insecure databases for the specified file. These databases are then installed into /etc/spwd.db and
/etc/pwd.db, respectively. The file is installed into /etc/master.passwd. The file must be in the correct format (see passwd(5)). It is
important to note that the format used in this system is different from the historic Version 7 style format.
The options are as follows:
-c Check if the password file is in the correct format. Do not change, add, or remove any files.
-d directory
Operate in a base directory other than the default of /etc. All absolute paths (including file) will be made relative to directory.
Any directories specified as a part of file will be stripped off. This option is used to create password databases in directories
other than etc; for instance in a chroot(8) jail.
-p Create a Version 7 style password file and install it into /etc/passwd.
-s Only update the secure version of the database. This is most commonly used in conjunction with the -u flag during a password change.
Because the insecure database doesn't contain the password there is no reason to update it if the only change is in the password
field. Cannot be used in conjunction with the -p flag.
-u username
Only update the record for the specified user. Utilities that operate on a single user can use this option to avoid the overhead of
rebuilding the entire database. This option must never be used if the line number of the user's record in /etc/master.passwd has
changed.
file The absolute path to a file in master.passwd format, as described in passwd(5).
The two databases differ in that the secure version contains the user's encrypted password and the insecure version has an asterisk ('*').
The databases are used by the C library password routines (see getpwent(3)).
pwd_mkdb exits zero on success, non-zero on failure.
FILES
/etc/master.passwd current password file
/etc/passwd a Version 7 format password file
/etc/pwd.db insecure password database file
/etc/pwd.db.tmp temporary file
/etc/spwd.db secure password database file
/etc/spwd.db.tmp temporary file
SEE ALSO
chpass(1), passwd(1), db(3), getpwent(3), passwd(5), vipw(8)
STANDARDS
Previous versions of the system had a program similar to pwd_mkdb, mkpasswd, which built dbm(3) style databases for the password file but
depended on the calling programs to install them. The program was renamed in order that previous users of the program not be surprised by
the changes in functionality.
BUGS
Because of the necessity for atomic update of the password files, pwd_mkdb uses rename(2) to install them. This, however, requires that the
file specified on the command line live on the same file system as the /etc directory.
There are the obvious races with multiple people running pwd_mkdb on different password files at the same time. The front-ends to pwd_mkdb,
chpass(1), passwd(1), and vipw(8) handle the locking necessary to avoid this problem.
BSD
June 6, 1993 BSD