Depending on the TYPE of drive, you could attach it to another system
and patch the sectors containing /etc/passwd to hold a dummy password
file. If it is SCSI, it is easy to attach to any system, not mount
the drive (the filesystem probably isn't compatible), and read/write
it through the raw device interface.
In my younger (more than the statute of limitations :) days, I hacked
the root account be reading the entire raw device (/dev/ra0a) and
tweaking someones user account to have no password and root privledges.
The /etc/passwd file showed up in three different places, so I assume
it was shadowed, but I patched the shadows as well...
IE:
joes:ASDFADSFASDFA:1020:1001:Joe J. Schmuck:/usr/home/joes:/bin/csh
is changed to:
joes::0:0:This is to make the leng the same:/usr/home/joes:/bin/csh
Or pasted in an encrypted password you already have... Reinstall
the disk into the HP and boot it up.
clint
On Sun, 19 Sep 1999 jeff.kaneko(a)juno.com wrote:
Guys:
I just scored a HP 9000/340 (I think), and the hard drive
has HP/UX loaded on it. I don't know the root password,
of course. Anybody know of a way to break into this, or
should I wipe it and start over?
Jeff
___________________________________________________________________
Get the Internet just the way you want it.
Free software, free e-mail, and free Internet access for a month!
Try Juno Web:
http://dl.www.juno.com/dynoget/tagj.