Comment on: Stupidest Mistake you've made lately? Here's mine.. Just locked myself out of a new server.
Comment on: Stupidest Mistake you've made lately? Here's mine.. Just locked myself out of a new server.
I love linux but an argument can be made that it's worse. Due to the source being open, those with the time and skill can more easily tract the vulnerabilities. Remember all the patched released were vulnerabilities the entire time.
Many people think the thousand eyes on the code is a good thing and it is--if it's a thousand eyes. Usually it's just a couple and everyone relaxed because it's "open source".
By the way, I edited my comment for an even easier way to reset your linux password.
Comment on: Stupidest Mistake you've made lately? Here's mine.. Just locked myself out of a new server.
You have to have vulnerabilities on your system to remotely exploit. Then your machine has to be in a state to do it anyhow--the port is open and something is listening(in most cases). Windows isn't trivial to exploit no matter what anyone says. The same situation applies.
Now if you're the NSA and pay millions of dollars for unknown exploits then it's entirely different. For us average schmucks a system basically has to be exposed and unpatched.
However, if you have physical access to your linux box then just mount the volume, run mkpasswd -m sha-512 -s <<< passwordyouwant put that in /etc/shadow, reboot and log in.
For windows, just mount the ntfs partion rw then run chntpw -u <user> SAM.
Comment on: Stupidest Mistake you've made lately? Here's mine.. Just locked myself out of a new server.
Yeah you have to have physical access.
Comment on: Stupidest Mistake you've made lately? Here's mine.. Just locked myself out of a new server.
You can get into/change the root/admin password of any Windows or Linux server that isn't encrypted if you have physical access.