From owner-freebsd-questions@FreeBSD.ORG Sat Jan 14 17:33:00 2006 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id A697E16A420 for ; Sat, 14 Jan 2006 17:33:00 +0000 (GMT) (envelope-from wojtek@tensor.3miasto.net) Received: from chylonia.3miasto.net (chylonia.3miasto.net [213.192.74.6]) by mx1.FreeBSD.org (Postfix) with ESMTP id 30B8B43D67 for ; Sat, 14 Jan 2006 17:32:54 +0000 (GMT) (envelope-from wojtek@tensor.3miasto.net) Received: from chylonia.3miasto.net (localhost [127.0.0.1]) by chylonia.3miasto.net (8.13.4/8.13.4) with ESMTP id k0EHWoQr001650; Sat, 14 Jan 2006 18:32:50 +0100 (CET) (envelope-from wojtek@tensor.3miasto.net) Received: from localhost (wojtek@localhost) by chylonia.3miasto.net (8.13.4/8.13.4/Submit) with ESMTP id k0EHWkJE001647; Sat, 14 Jan 2006 18:32:50 +0100 (CET) (envelope-from wojtek@tensor.3miasto.net) X-Authentication-Warning: chylonia.3miasto.net: wojtek owned process doing -bs Date: Sat, 14 Jan 2006 18:32:46 +0100 (CET) From: Wojciech Puchar X-X-Sender: wojtek@chylonia.3miasto.net To: Grant Peel In-Reply-To: <003e01c6191f$d9d2cfb0$6501a8c0@GRANT> Message-ID: <20060114183214.O1344@chylonia.3miasto.net> References: <003e01c6191f$d9d2cfb0$6501a8c0@GRANT> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: freebsd-questions@freebsd.org Subject: Re: Lost Root Pasword. X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 14 Jan 2006 17:33:00 -0000 > now, cant su. the password I used is > 12 chars long, and was made > intentionally cryptic. I know all the chars used in the password (yes I have > it written down). > > Q: Where are all the ssh password 'guessing' utilities I see the hackers > using on my system? Located, I could really use one. > > Failing this, I will need to drive to TO and reboot the system by hand and > change the passwd. a waste of $50 in gas. > next time use .ssh/authorized_keys or .rhosts or other way to do passwordless logins :)