Date: Fri, 15 Mar 1996 17:25:34 -0800 (PST) From: Richard Chang <richardc@CSUA.Berkeley.EDU> To: "Aaron D. Gifford" <agifford@infowest.com> Cc: questions@freebsd.org Subject: Re: Passwords Message-ID: <Pine.PTX.3.91.960315172415.3376C-100000@soda.CSUA.Berkeley.EDU> In-Reply-To: <2.2.32.19960315233819.006d2e4c@infowest.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 15 Mar 1996, Aaron D. Gifford wrote: > At 11:43 AM 3/15/96 -0800, you wrote: > >Hi there, > > > > We are running a site that had security breakins and the hacker > >managed to changed the root password and the edited both the /etc/passwd > >and /etc/master.passwd file and deleted pretty much everything in it. It > >seems the pwd.db and spwd.db are the original ones since apparently the > >person didn't use vipw on the DES encrypted system. I was wondering if > >there was a way to use the pwd.sb and spwd.db even if the encrypted passwd's > >in master.passwd don't match.... Thanks. > > > >Richard > > > > Hi, > > I've trashed my master.passwd file before, so I wrote me a perl script to > regenerate my master.passwd file from the spwd.db file. It has worked for > me. maybe it will work for you. > > Aaron [perl script deleted to save bandwidth] Now is there a way to regenerate passwd from pwd.db? Thanks! Richard
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.PTX.3.91.960315172415.3376C-100000>