Ubuntu does not turn on the root user by default, and remote logins are not allowed even if a password is set.
The password for the root of the change is generally used by the normal user through the sudo mechanism, but if all ordinary users do not have sudo permission before the root password is set, this can only be cracked by entering single user mode or recovery mode.
Beta version: 14.04 server
Single-User mode
When the boot menu appears, press "E" key to enter edit
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/7F/B7/wKioL1cqmDTzi3QdAAAcJn4txmo368.png "style=" float: none; "title=" 1.png "alt=" Wkiol1cqmdtzi3qdaaacjn4txmo368.png "/>
If the root account is not initialized, then just modify the kernel boot parameters, add "single", press Control+x or F10 to start.
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/7F/B9/wKiom1cql17DWpQwAAAvDnW6RNc331.png "style=" float: none; "title=" 2.png "alt=" Wkiom1cql17dwpqwaaavdnw6rnc331.png "/>
However, if the root account has already set a password, you need to enter the root account password to continue booting after the above operation.
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/7F/B7/wKioL1cqmDWyc628AABO8EiNYg8118.png "style=" float: none; "title=" 3.png "alt=" Wkiol1cqmdwyc628aabo8einyg8118.png "/>
It is necessary to modify the kernel parameters and add the following parameters:
Quiet Splash RW Single Init=/bin/bash
Note:
Quiet suppress the output of some logs and other information
Splash with resolution, if missing may cause a failure to start
RW Read-write mode mount, otherwise unable to modify account password or modify other configuration file
Single user mode
Init=/bin/bash replaces the INIT process at startup and provides a shell interface using/bin/bash
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M00/7F/B7/wKioL1cqm5qgM_8SAAAxWPcTGjk783.png "title=" 4.png " alt= "Wkiol1cqm5qgm_8saaaxwpctgjk783.png"/>
Modify the root password, you can also modify the/etc/sudoers, so that ordinary users have sudo permissions.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/7F/B7/wKioL1cqm7LTFprbAAAeBqigoA0358.png "title=" 5.png " alt= "Wkiol1cqm7ltfprbaaaebqigoa0358.png"/>
Rescue mode
Boot from CD, select rescue mode
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M00/7F/B7/wKioL1cqnm6jKM79AAApyNg_zTc328.png "style=" float: none; "title=" 1.png "alt=" Wkiol1cqnm6jkm79aaapyng_ztc328.png "/>
Select the root partition of the disk system
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/7F/BA/wKiom1cqnZjwTxdWAAAppRqZ0ds939.png "style=" float: none; "title=" 2.png "alt=" Wkiom1cqnzjwtxdwaaapprqz0ds939.png "/>
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/7F/B7/wKioL1cqnm-TGTY_AAAeTWxCDts195.png "style=" float: none; "title=" 3.png "alt=" Wkiol1cqnm-tgty_aaaetwxcdts195.png "/>
Root password has been modified
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/7F/BA/wKiom1cqnZmiv7CCAAAvCq4S_xE532.png "style=" float: none; "title=" 4.png "alt=" Wkiom1cqnzmiv7ccaaavcq4s_xe532.png "/>
This article is from the "retrograde person" blog, please be sure to keep this source http://lingyi.blog.51cto.com/2837715/1770266
Ubuntu hack root Password