In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
In our daily work and handover process, we often forget the root password, or the last worker did not hand over the password of the last system, of course, it is impossible for us to reinstall the linux system for work reasons. But is there no other solution but to reinstall the system? For example, can the password be cracked like the windows operating system?
Of course, the answer is obvious, and it is certainly possible. This is what beginners must learn, just as it is important to learn to install linux systems.
Next, I will teach you to crack the root permission password of RedHat. In fact, because all kinds of linux systems use the same kernel, they are more or less the same. Basically, you can use this method to crack, or that sentence, just try and know.
The first step is:
You must first determine the version of the system and whether it is a RHEL 7 system. If so, then do the following. Of course, sometimes we can not achieve this operation, that does not matter, we directly carry on the following operation, do the fuck will be done, can not be successful, for example, my system is not RHEL 7.0but 8.0.
Make sure that the statement in the system version is cat / etc/redhat-release, and of course uname-an is another good way.
Restart the computer and press e on the following page to enter edit mode.
Find linux on the following page, press the end key on this line, write rd.break in the last space, press control+X, and start the operating system in break interrupt mode.
The break mode, also known as emergency rescue mode, entered about 30 seconds later, which is similar to windows's safe mode, only starts a repair system similar to the pe system. Enter the following two commands.
The purpose of these two commands is to be able to access the commands of the linux operating system on the disk as root, so that we can run the commands of the operating system on the original disk with the highest privileges, such as passwd, so that we can change the root password.
The first line of the mount mount command is to mount the operating system kernel files in a read-write manner, because linux is all files, and the kernel is no exception.
The second line of the chroot command is to change the shell root directory, what we call the root directory, to the sysroot directory, so that shell can run the commands under this directory.
Well, the presence of sh-4.4 means that shell can be run properly, and the ability to run shell means that you can use commands to manipulate kernel and disk files. Then we can run the passwd command to change the password of the root user,
The appearance of this successfully indicates that the password has been changed successfully. In fact, at this time, we can do all the operations with the highest privileges. So in fact, as long as you can come into contact with the operating system hardware itself, this operating system does not have any security to speak of. People restart it and easily get the highest permissions. Change the root password, and you will already appear naked in front of others.
But this is not over, because the US National Security Agency has a SElinux that every reboot will labeling the operating system, which takes a very long time. If it does not pass the relabeling of this SElinux, the system will not be able to boot.
This mechanism has a hidden file, and as long as this file exists, the operating system defaults that we have passed the relabeling. So we need to create a new file. I don't know if I have made this place clear. If I don't make it clear, it means I'm not very clear. After all, I don't think it's of much use. It doesn't matter if I don't know. I just want to know how to use it. )
Create a new file that is automatically relabeled, followed by exit, reboot. We're done, over.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.