Summary : Press and hold any key (shift) to stop the Grub menu, enter advanced option for Ubuntu, the menu that appears, move the cursor to ... (recovery mode) Press E to enter the editor, find the RO recovery nomodeset change to RW single init=/b ...
-
Press and hold any key (shift) to stop the Grub menu, enter advanced option for Ubuntu, the menu that appears, move the cursor to ... (recovery mode) Press E to enter the edit, find the RO recovery nomodeset change to RW single Init=/bin/bash, and finally ctrl x restart.
1, in the case of non-login, get root permissions
If the grub password is not set, then we can use the simplest method, first start the computer, wait for the Grub menu, if the Grub menu is hidden, you can press ESC to recall, choose Ubuntu, Kernel 2.6.12-*-* (recovery mode), that is " Recovery Mode "Press ENTER to start it." Another option is to use the Ubuntu installation disk to gain root privileges, start the computer with the Ubuntu installation disk, and when "boot:" is displayed, enter "Rescue"
Boot:rescue
Follow the on-screen instructions to get root privileges.
Then # passwd root New password
# vi/etc/x11/gdm/gdm.conf #打开gnome的配置文件, enter in the last line mode: Allowroot return, find allowroot= false, change false to True, save and exit.
Then, when you restart the system, you can log in with root. If you want to disable the root account, execute the following command:
$sudo passwd-l Root
2. Gain root privileges by changing kernel boot parameters
Start the computer, wait for the Grub menu, if the Grub menu is hidden, you can press ESC to recall, if the grub password is set, press p to unlock, for example, we chose Ubuntu, kernel 2.6.12-8-386, press E before starting to edit the startup parameters, select kernel/ boot/vmlinuz-2.6.12-8-386 root=/dev/hda2 ro Quiet Splash, press E to edit the selected Startup menu item, add RW Init=/bin/bash at the end of the parameter, and change to the following command line:
Grub edit> kernel/boot/vmlinuz-2.6.12-8-386 root=/dev/hda2 ro quiet Splash rw Init=/bin/bash
Press B to start.
3, forgot the root user/master user password
Follow the first entry: in the case of not logged in, after obtaining root privileges, enter at the command line:
passwd root Follow the prompts, enter the password two times to set the root user password.
To change the master user password:
passwd System_main_username
Follow the prompts and enter the password two times.
Password methods for each version of Linux:
(a) Redhat/centos/fedora system password hack
1. Press E to enter edit mode on the GRUB Options menu
2. Edit kernel and add s (or single) at the end of the line
3. Press B to start the Single-user mode
4. After entering, execute the following command
# MOUNT-T proc Proc/proc
# Mount-o REMOUNT,RW/
#passwd
#sync
#reboot
(ii) Debian Linux system password cracking
1. In the Grub Options menu ' Debian gnu/linux,... (recovery mode) ', press E to enter edit mode
2. Edit kernel the last RO single to RW single init=/bin/bash, press B to perform the restart
3. After entering, execute the following command
[Email protected] (none) #mount-A
[Email protected] (none) #passwdroot
[Email protected] (none) #reboot
(iii) FREEBSD system password cracking
1. Booting into the boot menu
2. Select each item (press 4) to enter single user mode
3. Enter a list of commands after entering
[Email protected] #mount-A
[Email protected] #fsck-y
[Email protected] #passwd (change password command)
[Email protected] #root (username to crack the password)
Enter New UNIX Password:
[Email protected] #init6 (restart)
(iv) Solaris system password cracking
1. Select the Solaris FAILASFE entry in the Grub Options menu
2. Is the system prompt does wish to has it mounted read-write on/a? [Y,n,?] Select Y
3. Enter single-user mode
4. Enter the following command: passwd
[Email protected] #init6 (restart)
(v) NETBSD system password hack
1. Power on: When the prompt sign appears and start the countdown for five seconds, type the following command:
> boot-s (enter single-user mode command)
2. In the following hint symbol
Enter pathname of shell or RETURN for SH:
Press Enter.
3. Type the following command:
# mount-a
# fsck-y
4. Use passwd to change the root password.
5. Use the Exit command to enter multi-person mode.
(vi) SUSE system password cracking
1. Restart the machine, after the Grub boot interface appears, add Init=/bin/bash to the boot Linux option, and pass the Init=/bin/bash parameter to the kernel so that the OS runs bash before running the login program, and the command line appears.
2. Wait a moment to appear (none) #: Command line.
3. Enter mount-n/O REMOUNT,RW to re-mount the root file system to read and write, with read and write permission to change the password through the passwd command.
4. Enter the passwd command to reset the password.
5. After the modification, remember to use Mount-n/O Remount,ro to set the root file system to the original state.
Ubuntu Hack Password method