> root:QvAAlS1A:0:0:/:/bin/sh
Definitely an odd hash for the root password, if I can
figure out how
to start the machine in single-user mode it'd be trivial to reset it,
otherwise I'll probably do as Al suggested and hack the disk image.
Maybe if I reset the machine without syncing the disks, fsck will
fail on the next boot and drop me into single user mode ;). (Gotta
love the reliability of old UNIX filesystems...)
Original Bell unix stored unencrypted passwords. The first hashed
password storage used the M-209 rotor machine emulation which already
existed in unix somewhere. As with the DES hash which came shortly
after, the M-209 setup used the password as the key and encrypted a
fixed data pattern. I don't know if the M-209 variant salted. Last I
checked, the DES version used a block of zeros as the data, dunno yet
about M-209.
Haven't gotten as far as tuhs to see if I can find the old crypt yet.
De