If you forgot you password for your ubuntu system you can recover using the following steps Turn your computer on.
Press ESC at the grub prompt.
Press e for edit.
Highlight the line that begins kernel ………, press e
Go to the very end of the line, add rw init=/bin/bash
press enter, then press b to boot your system.
Your system will boot up to a passwordless root shell.
Type in passwd username
I am trying to create place where I post my learning to shift to UBUNTU. Many a times you may find cut-pasts from different forums. My try is to bring them under one roof in the sequence of my learnings
How to set grub 2 password protection
- Introduction to Grub 2 Basic Password Protection
- This is basic password security. The username/password are unencrypted; anyone having physical access to the machine and more than an elementary knowledge of how Linux works will be able to access the configuration files and bypass this feature. Encrypted password protection is on the horizon and available in an experimental version of Grub 2 (see “The Future” section below).
- Grub 2 can set password protection on specific menuentries and for specific users. For example, “John” can access Ubuntu but not the Windows recovery mode, which is only accessible by “Bill”, the superuser.
- Automatic password protection has not yet been automated. Menuentries must be identified manually by editing the Grub 2
/etc/grub.d/
scripts such as 10_linux and 30_os-prober. - If password protection is enabled, even if for only one entry, and even if not for the superuser, the superuser name and password are required to gain access to the Grub 2 command
line and menu-editing modes. - The username and/or password do not have to be the same as the Ubuntu logon name/password.
- How It Works
- To enable basic password protection, the user/administrator must add a superuser (and other users if desired) and password(s) to the
/etc/grub.d/00_header
file and manually designate which menuentries require a password in the/etc/grub.d/
files. - The Grub 2 menu can include both password-protected and non-protected entries.
- Once the password feature is enabled the Grub 2 menu will appear as it does normally. When a selection requiring a password is required, the user will be prompted to enter the correct username and password. If entered correctly, the selected menuentry will continue to boot. If incorrect, the user will be returned to the Grub 2 menu.
- If Grub 2 is set up to boot directly to a password-protected menuentry without displaying a menu, the username/password prompt will appear and booting will not occur until they are correctly entered.
- Here is a sample menu with passwords enabled, provided by one of the Grub 2 developers:
- user1 is the designated superuser. This user can boot any menuentry, edit items in the Grub 2 menu during boot, and use the Grub 2 command line.
- Anyone can boot GNU/Linux
- Only user2 and the superuser can boot Windows in this example.
set superusers="user1" password user1 password1 password user2 password2 menuentry "GNU/Linux" { set root=(hd0,1) linux /vmlinuz } menuentry "Windows" --users user2 { set root=(hd0,2) chainloader +1 }
- To enable basic password protection, the user/administrator must add a superuser (and other users if desired) and password(s) to the
- Warnings & Cautions
- Errors in creating a password-protected Grub 2 menu may result in an unbootable system. To restore a system with broken passwords, access and edit the Grub 2 configuration files using the LiveCD or another OS.
- If password protection is enabled, only the designated superuser can edit a Grub 2 menu item by pressing “e” or use the command line by pressing “c”.
- Caution: If Grub 2 is set up to boot automatically to a password-protected menuentry the user has no option to back out of the password prompt to select another menuentry. Holding the SHIFT key will not display the menu in this case. The user must enter the correct username and password. If unable, the configuration files will have to be edited via the LiveCD or other means to fix the problem.
- Setting Up Password Protection
- Superuser & Password Designation (Required) A superuser must be designated. This superuser can access any menuentry, edit the menuentries in the Grub 2 menu by pressing “e”, or invoke the Grub 2 command line mode. Add the following the bottom of /etc/grub.d/00_header
- Other Users (Optional) Other users can be identified and given a password. A designated user can access unprotected and his/her own menuentries. Add the following the bottom of
- Designating Menuentries for Password Protection
- Password protect all Linux kernels on the main partition:
/etc/grub.d/10_linux
(approximately line 59):
From:
menuentry "$1" { To allow the superuser only:
menuentry "$1" --users user1 {
Example to permit access by only the superuser (superman):menuentry "$1" --users superman {
Example to permit access by the superuser (superman) and bill:menuentry "$1" --users bill {
- Password protect all Linux kernels on the main partition:
- Password protect the memtest86+ option: /etc/grub.d/20_memtest[/B] (approximately line 27). Make the change as described in the /etc/grub.d/10_linux section above.
- Password protect kernels/operating systems on other partitions: /etc/grub.d/30_os-prober. Make the change(s) as described in the /etc/grub.d/10_linux section above. Linux entries on other partitions (approximately line 136):
cat << EOF set superusers="user1" password user1 password1 EOF
Example:cat << EOF set superusers="superman" password superman 1234 EOF
/etc/grub.d/00_header
cat << EOF set superusers="user1" password user1 password1 password user2 password2 EOF
Example:cat << EOF set superusers="superman" password superman 1234 password bill 5678 EOF
menuentry "Memory test (memtest86+)" --users superman {
Additional memtest86+ entries (from other partitions) may also be located in this file. The line will start with “menuentry”. Change these lines as desired.menuentry "${LLABEL} (on ${DEVICE})" --users superman {
Other OperatingSystems , including Windows (approximately line 100):menuentry "${LONGNAME} (on ${DEVICE})" --users superman {
OSX entries (in the macosx) section, approximately line 156):menuentry "${LONGNAME} (on ${DEVICE})" --users superman {
Once the superuser/other users and their password(s) are established, the entries to be protected must be identified. Currently Grub 2 adds no password protection to any entries upon establishment of a superuser and password in/etc/grub.d/00_header
. (Note: This may change. See “The Future” section below.) Each menuentry must be identified and modified. Scripts can be used to tailor entries for specific menuentries. See the “Scripts” section for examples. The remainder of this section will explain how to change the main script files in/etc/grub.d/
to set up password protection for entire classes of menuentries (Linux on the main partition, OSs on other partitions, memtest86+, etc). Remember that editing the/boot/grub/grub.cfg
file directly is discouraged. For protecting specific menuentries, another option is to add entries to the/etc/grub.d/40_custom
file and disable the applicable script file in the same folder. For example, copy the Windows entries from/boot/grub/grub.cfg
to 40_custom, add “–users user1″ to the desired entry (such as the Windows recovery partition) and then remove the executable bit from/etc/grub.d/30_os-prober
. Save the files, run “sudo update-grub”, and reboot.
/etc/grub.d/
scripts.
- The way Grub 2 assigns password protection may change. Currently the default is for menuentries to be unlocked. The developers are considering making the passwords mandatory for all entries once a superuser is designated. The superuser would then be able to unlock entries. If this feature is incorporated in the Ubuntu version of Grub 2 I will update these instructions.
- The first two ccommands make backups of the files to be modified.
- filename(s) should be replaced by the specific script file names you wish to change. These files are located in /etc/grub.d/ and include 10_linux, 20_memtest86+, and 30_os-prober. You can include one or more in the commands.
etc/grub.d/00_header
and inspect /boot/grub/grub.cfg to ensure you achieved the desired results. Notes: sudo mkdir /etc/grub.d.backup sudo cp /etc/grub.d/* /etc/grub.d.backup sudo sed -i -e '/^menuentry /s/ {/ --users user1 {/' filename(s)Example:
sudo sed -i -e '/^menuentry /s/ {/ --users superman {/' /etc/grub.d/10_linux /etc/grub.d/20_memtest86+ /etc/grub.d/30_os-prober /etc/grub.d/40_customTo undo the previous command, run:
sudo sed -i -e '/^menuentry /s/ --users user1 {/ {/' filename(s)Example:
sudo sed -i -e '/^menuentry /s/ --users superman[/B] {/ {/' /etc/grub.d/10_linux /etc/grub.d/20_memtest86+ /etc/grub.d/30_os-prober /etc/grub.d/40_customSave the files, run “sudo update-grub”, and reboot. At the Grub 2 menu, you will be presented with the normal menu. When you make a selection, a prompt will ask for the username and password.
- Determine the Windows Recovery partition (sda1, sda2, etc).
- Add the desired username and password as described in Section 4A and 4B to /etc/grub.d/00_header.
- Open /etc/grub.d/30_os-prober for editing:
- Save the file, then run:
cd /etc/grub.d/ sudo cp 30_os-prober 30_os-prober.bak # Make a backup copy sudo chmod -x 30_os-prober.bak # Remove executable bit gksu gedit 30_os-prober &Change the following (approximately line 100) From:
cat << EOF menuentry "${LONGNAME} (on ${DEVICE})" { EOFTo:
if [ ${DEVICE} = "/dev/sdXY" ]; then cat << EOF menuentry "${LONGNAME} (on ${DEVICE})" --users user1 { EOF else cat << EOF menuentry "${LONGNAME} (on ${DEVICE})" { EOF fiExample setting protection on sda2 for user superman:
if [ ${DEVICE} = "/dev/sda2" ]; then cat << EOF menuentry "${LONGNAME} (on ${DEVICE})" --users superman { EOF else cat << EOF menuentry "${LONGNAME} (on ${DEVICE})" { EOF fi
sudo update-grub
- Encrypted password protection using PBKDF2 is available but for me still a bit buggy in Lucid (Grub 1.9. If you are going to experiment with encrypted passwords, make sure you have at least one good non-password protected menuentry to boot or you may not be able to log on if you encounter problems. To generate an encrypted password:
grub-mkpasswd_pbkdf2The format for an encrypted password entry in
/etc/grub.d/00_header
would look similar to:
set superusers="drs305" password_pbkdf2 drs305
/etc/default/grub
: GRUB_TERMINAL=console
How To Reset Windows Password Using Ubuntu
I have a funny experience. Few days ago, my senior (at my office) ask me to change his computer password (Windows XP Professional). He said, "...please tell me how to change my password. Just tell me the way and I'll change the password by myself...". When I asked him the reason, his answer is "...so you can't use my computer anymore..." :D
Yesterday, he called me. "...panoet, do you know my new password?..." and of course "NO" is my answer. "...Why you ask to me? Yesterday you've changed your password. Right?...". Guess, what his answer?
"I've forgotten my new password!"! LOL, I think. Yesterday you want to change your password so I can't use your computer and know you ask me the password because you've forgotten your new password. Is it sounds silly, right?
Have you ever experienced anything like that? Lost your Windows password? If you have, how to fix that?
This is step-by-step to reset your Windows password:
Yesterday, he called me. "...panoet, do you know my new password?..." and of course "NO" is my answer. "...Why you ask to me? Yesterday you've changed your password. Right?...". Guess, what his answer?
"I've forgotten my new password!"! LOL, I think. Yesterday you want to change your password so I can't use your computer and know you ask me the password because you've forgotten your new password. Is it sounds silly, right?
Have you ever experienced anything like that? Lost your Windows password? If you have, how to fix that?
How to reset your Windows password?
To reset your Windows password is very easy, as easy as resetting your Ubuntu password. What you need is bootable Ubuntu system (ie. USB, CD or anything) and software calledchntpw
.This is step-by-step to reset your Windows password:
- Boot from your bootable device (Ubuntu Live Session) Shutdown your computer and boot up using your bootable system. So you run Ubuntu on Live Session that means you run your system without install it!
- Set your repository Goto
- Install CHNTPW Install from Synaptic Package Manager or use this command on shell:
- Resetting Windows password
- Mount your "Windows installed" device It's depending on your system, example:
- Goto your Windows system configuration folder Located at
- Cracking the SAM file There a SAM file on Windows system configuration folder. That's the file we're looking for. Let's crack it :) (sounds cool)
Synaptic Package Manager
→ Settings
→ Repositories
→ Ubuntu Software
and check the "Software restricted by copyright or legal issues" checkbox. And don't forget to reload synaptic.
sudo apt-get install chntpw
sudo mkdir /media/WINDOWS sudo mount /dev/sda1 /media/WINDOWSOn my system Windows installed on
/dev/sda1
and I want to mount it to /media/WINDOWS
that I've created before.
[WINDOWS_DEVICE]/WINDOWS/system32/config/
:
cd /media/WINDOWS/WINDOWS/system32/config/
chntpw SAMAnd if you see the output similar with image below, it's mean you can crack the SAM file.
As you see, there is 5 choices. Just type "1" and press "ENTER" to reset your password.
Note: I've try this on my system and work well! But I've never try another choices (2-4) yet, you can try yourself.
How to reset forgotten Ubuntu password
Login as root
There is two possible ways to login as root :
* Common method
You can login with root mode just by pressing ESC button when system starting up. That’ll take you to Grub Screen, when you can select mode that you’ll be used while booting. If you have double OS or more on your system (dual boot), you don’t need to do this step. It’s automatically go to Grub Screen when system starting up.
Then choose the “recovery mode”, usually found right below your default option. Press enter, and at the next screen, choose “drop to root sheel prompt” and you’ll login to the system as root :)
* Advanced method
On some system, maybe you can’t find “recovery mode” on Grub Screen menu. So? You need to do a “little hack” to the Grub Loader. Looks cool right? In fact its very easy :)
On Grub Screen menu, select default loader (first choice) and press “E” key that means you’ll edit manually that loader. Wow :)
On the next screen, find row that contains this word :
ro quiet splash
Then replace that with this :
rw init=/bin/bash
After that, press “CTRL”+”X” (or maybe “B” key on your system, depend to your kernel) to boot the system with “hacked” loader :)
Done! You’re logged in as root on your system now, and you can do anything you want. Including resetting your password!
Resetting your password
Use this command to reset your password :
passwd [username]
Fill username with username that you want to reset its password. You’ll prompt new password twice.
In this step, you’re almost done! Now, make sure the change you’ve made will be written to disk by :
sync
Reboot your system :
reboot -f
You’re done! Your password has been reset, and you can login to your system now :)
I’ve been using this method on my Ubuntu Lucid system and its work. I hope this post is useful for you all. If you have problem when implementing this article, leave a comment and I’ll be glad to help you.
There is two possible ways to login as root :
* Common method
You can login with root mode just by pressing ESC button when system starting up. That’ll take you to Grub Screen, when you can select mode that you’ll be used while booting. If you have double OS or more on your system (dual boot), you don’t need to do this step. It’s automatically go to Grub Screen when system starting up.
Then choose the “recovery mode”, usually found right below your default option. Press enter, and at the next screen, choose “drop to root sheel prompt” and you’ll login to the system as root :)
* Advanced method
On some system, maybe you can’t find “recovery mode” on Grub Screen menu. So? You need to do a “little hack” to the Grub Loader. Looks cool right? In fact its very easy :)
On Grub Screen menu, select default loader (first choice) and press “E” key that means you’ll edit manually that loader. Wow :)
On the next screen, find row that contains this word :
ro quiet splash
Then replace that with this :
rw init=/bin/bash
After that, press “CTRL”+”X” (or maybe “B” key on your system, depend to your kernel) to boot the system with “hacked” loader :)
Done! You’re logged in as root on your system now, and you can do anything you want. Including resetting your password!
Resetting your password
Use this command to reset your password :
passwd [username]
Fill username with username that you want to reset its password. You’ll prompt new password twice.
In this step, you’re almost done! Now, make sure the change you’ve made will be written to disk by :
sync
Reboot your system :
reboot -f
You’re done! Your password has been reset, and you can login to your system now :)
I’ve been using this method on my Ubuntu Lucid system and its work. I hope this post is useful for you all. If you have problem when implementing this article, leave a comment and I’ll be glad to help you.
connect to local server share location command
"sudo mount //server/share /tmp/smb/ -t cifs -o username=user,password=password"
Command to find bluetooth device from command line in UBUNTU
hcitool scan
Sending file to bluetooth device from command line
gnome-obex-send -d $device /path/to/file
NAME
obexpushd - receive files with OBEX protocol via Bluetooth, IrDA or
network connection
SYNOPSIS
obexpushd [-B [[[address]:]channel]] [-I[app]] [-N [[[address]:]port]]
[-p file] [-a file] [-r file] [-s file] [-n | -d] [-h | -v]
DESCRIPTION
obexpushd is a program that can be used to receive files using OBEX
(OBject EXchange) protocol over Bluetooth, IrDA or network connection.
It can be used to receive files from mobile phones and other devices.
When run without -d or -n options obexpushd puts itself to the
background and starts to listen for incoming connections via Bluetooth
(default) and/or IrDA and/or network connection(TCP). obexpushd saves
all received files to it´s current directory but can alternativly
forward all received data to a script for further processing.
OPTIONS
-B
Listen to Bluetooth connections. It is possible to specify an
address of a local adapter and a channel number to listen to.
Default is to use channel 9. The address can be either a bluetooth
adapter interface name (e.g. "hci0"), only the number of that
interface (e.g. "0") or the interface address enclosed in brackets
(e.g. "[11:22:33:44:55:66]").
-I
Listen to IrDA connections on the default inbox and, in addition
and optionally, to the inbox identified by app (example: IrXfer)
-N
Listen to network connections. If compiled with TcpOBEX support
(openobex > 1.3), it is possible to specify an address and a port
number to listen to (default: *:650). Note that to bind to the
default TCP OBEX port, you need root priviledges. The address can
either be an IPv4 address in quad-dot-notation (e.g. "127.0.0.1"),
an IPv6 address enclosed in brackets (e.g. "[::1]") or a "*" as
alias for "[::]".
-p
Write the process ID of the daemon to file
-a
Read user:password pairs from each line of file. Note that many
client cannot handle authentication and will stop working when
using this option. A realm of "obexpushd" will be sent to the
client. Note that no encoding is used, the plain byte sequence will
be matched. The user identifier must not be longer than 20 bytes
and the password must not be longer than 128 bytes. If file starts
with a pipe symbol, the file after the pipe symbol will be executed
with one argument, the user name. The output shall be the same as a
file line.
-r
Read realm:user:password triples from each line of file. This is
only needed if a client wants a server that authenticates itself.
The realm is a value sent by the client. User and password from the
first realm match are used. The value of realm can have zero
length, else it must be encoded in UTF-8. The values for user and
password to not have any encoding, the plain byte sequence will be
used. The user identifier must not be longer than 20 bytes and the
password must not be longer than 128 bytes. If file starts with a
pipe symbol, the file after the pipe symbol will be executed with
one argument, the realm. The output shall be the same as a file
line.
-s
Open pipes to the script or program specified by file. These pipes
are seen by the program as stdin and stdout. There is one
parameter, that can be either "put" or "get".
Further parameters are fed to the script via stdin. With the first
parameter being "put", data optionally follows on stdin. With
"get", parameters and data are read via stdout. Parameters that are
transmitted via stdin or stdout have the form "Parameter: value".
The first empty line seperates parameters and data. The empty line
can be the first line. In this case, no parameters are present.
Line delimiter is system specific. The possible parameters are:
· "From: type/client-identifier" which specifies the client
address. Currently, types can be "bluetooth", "irda" or "tcp".
The client identifier is an address (embraced in brackets) with
optionally a port (seperated by a colon).
· "Name: utf8-string" (required on "get" output) which specifies
the file name,
· "Length: uint32" (required on "get" output) which specifies the
amount of data in bytes in the data section that follows, and
· "Type: ascii-string" which specifies the mime type of the data.
Unknown parameters shall be ignored. With "put", obexpushd is
waiting for an ok after the list of parameters. The script must
either print a line with "OK" to stdout to accept the input or
a line with any other content to reject it.
-n
Do not detach from terminal.
-d
Enable debug messages (implies -n).
-h
Show summary of options.
-v
Show version of program.
AUTHORS
Hendrik Sattler
Author.
Eugeniy Meshcheryakov
texted the first version of the manpage
hcitool scan
Sending file to bluetooth device from command line
gnome-obex-send -d $device /path/to/file
NAME
obexpushd - receive files with OBEX protocol via Bluetooth, IrDA or
network connection
SYNOPSIS
obexpushd [-B [[[address]:]channel]] [-I[app]] [-N [[[address]:]port]]
[-p file] [-a file] [-r file] [-s file] [-n | -d] [-h | -v]
DESCRIPTION
obexpushd is a program that can be used to receive files using OBEX
(OBject EXchange) protocol over Bluetooth, IrDA or network connection.
It can be used to receive files from mobile phones and other devices.
When run without -d or -n options obexpushd puts itself to the
background and starts to listen for incoming connections via Bluetooth
(default) and/or IrDA and/or network connection(TCP). obexpushd saves
all received files to it´s current directory but can alternativly
forward all received data to a script for further processing.
OPTIONS
-B
Listen to Bluetooth connections. It is possible to specify an
address of a local adapter and a channel number to listen to.
Default is to use channel 9. The address can be either a bluetooth
adapter interface name (e.g. "hci0"), only the number of that
interface (e.g. "0") or the interface address enclosed in brackets
(e.g. "[11:22:33:44:55:66]").
-I
Listen to IrDA connections on the default inbox and, in addition
and optionally, to the inbox identified by app (example: IrXfer)
-N
Listen to network connections. If compiled with TcpOBEX support
(openobex > 1.3), it is possible to specify an address and a port
number to listen to (default: *:650). Note that to bind to the
default TCP OBEX port, you need root priviledges. The address can
either be an IPv4 address in quad-dot-notation (e.g. "127.0.0.1"),
an IPv6 address enclosed in brackets (e.g. "[::1]") or a "*" as
alias for "[::]".
-p
Write the process ID of the daemon to file
-a
Read user:password pairs from each line of file. Note that many
client cannot handle authentication and will stop working when
using this option. A realm of "obexpushd" will be sent to the
client. Note that no encoding is used, the plain byte sequence will
be matched. The user identifier must not be longer than 20 bytes
and the password must not be longer than 128 bytes. If file starts
with a pipe symbol, the file after the pipe symbol will be executed
with one argument, the user name. The output shall be the same as a
file line.
-r
Read realm:user:password triples from each line of file. This is
only needed if a client wants a server that authenticates itself.
The realm is a value sent by the client. User and password from the
first realm match are used. The value of realm can have zero
length, else it must be encoded in UTF-8. The values for user and
password to not have any encoding, the plain byte sequence will be
used. The user identifier must not be longer than 20 bytes and the
password must not be longer than 128 bytes. If file starts with a
pipe symbol, the file after the pipe symbol will be executed with
one argument, the realm. The output shall be the same as a file
line.
-s
Open pipes to the script or program specified by file. These pipes
are seen by the program as stdin and stdout. There is one
parameter, that can be either "put" or "get".
Further parameters are fed to the script via stdin. With the first
parameter being "put", data optionally follows on stdin. With
"get", parameters and data are read via stdout. Parameters that are
transmitted via stdin or stdout have the form "Parameter: value".
The first empty line seperates parameters and data. The empty line
can be the first line. In this case, no parameters are present.
Line delimiter is system specific. The possible parameters are:
· "From: type/client-identifier" which specifies the client
address. Currently, types can be "bluetooth", "irda" or "tcp".
The client identifier is an address (embraced in brackets) with
optionally a port (seperated by a colon).
· "Name: utf8-string" (required on "get" output) which specifies
the file name,
· "Length: uint32" (required on "get" output) which specifies the
amount of data in bytes in the data section that follows, and
· "Type: ascii-string" which specifies the mime type of the data.
Unknown parameters shall be ignored. With "put", obexpushd is
waiting for an ok after the list of parameters. The script must
either print a line with "OK" to stdout to accept the input or
a line with any other content to reject it.
-n
Do not detach from terminal.
-d
Enable debug messages (implies -n).
-h
Show summary of options.
-v
Show version of program.
AUTHORS
Hendrik Sattler
Author.
Eugeniy Meshcheryakov
texted the first version of the manpage
Subscribe to:
Posts (Atom)