Also depends on the file system I don't own a next so don't know if its standard
ufs file system to properly mount. I had that problem with irix machines and a lack of
bootable media with support for ifs or whatever it was. I ended up editing the disk
directly, finding the root: string and overwriting it with a known md5 hash.
Not the worst time spent but certainly could save someone else from the frustration.
------Original Message------
From: Ryan K. Brooks
Sender: cctalk-bounces at
classiccmp.org
To: cctalk at
classiccmp.org
ReplyTo: General Discussion: On-Topic and Off-Topic Posts
Subject: Re: Next box with 1991 web page(s) password protected
Sent: May 24, 2013 4:01 PM
On 5/24/13 3:18 PM, Jim Stephens wrote:
Any idea how hard it is to hack the password on a Next
box?
http://www.bbc.co.uk/news/technology-22652675 Boot into single user and crack the
unshadowed passwords. Or mount the
disk elsewhere and do the same.