Another, dirtier option is to boot using init=vi as a kernel option.
This will bypass single use password protection as well.

> -----Original Message-----
> From: sentinel [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, February 04, 2003 7:19 PM
> To: [EMAIL PROTECTED]
> Subject: RE: Recover root password
> 
> If that's the case then I recommend booting into another environment,
> mounting your root disk and removing the root password.  I like the
> following distro for recovering from emergencies such as this
> 
> http://www.toms.net/rb/
> 
> If the password is not stored in /etc/passwd then most likely he's
using
> shadow passwords.  Remove the password from /etc/shadow and reboot.
> 
> 
> 
> 
> 
> -----------------------------------
> If he's put a password on the single bootup option, he's hosed.
> He'll have to crack the password file - but I'm thinking that the
> root password is not stored there...
> 
> 
> 
> --
> redhat-list mailing list
> unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
> https://listman.redhat.com/mailman/listinfo/redhat-list



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to