This goes over resetting ANY Linux password and two methods of doing so. . ►► Digital Downloads ➜ www.cttstore.com ►► Reddit ➜ / christitustech ►► Titus Tech Talk ➜ / titustechtalk ►► Twitch ➜ / christitustech
It should be noted that if you use LUKS drive encryption... NONE of these methods will work as the information can't be mounted without the encryption key. Want to reset password in Windows? Here is me using NT Offline password changer: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-4MEURdC8o8Y.html
Good to know that there are backup options for Linux Operating systems (TimeShift) - otherwise I would have to reinstall the entire dodad if I were to bonk the installation.
There is a third way: If you get into GRUB and go into the edit mode. Then you'd need to go to the line where it says "linux" and go to the far end. Then you add "init=/bin/sh" to it and if you then boot you'll get directly into a shell with root permissions (if the drive isn't encrypted)
I use this often as well, though many times the root partition is ro even if mount reports it as rw. So i usually end up having to do a mount -o rw,remount /
Nice! Back then, I did something somewhat similar in Windows XP by I think pressing Ctrl + Alt + Delete on the login screen and it went to the old fashioned one where you can manually type in user and password. I did the Administrator account without a password assigned to it and was able to reset stuff in that account normally.
thanks a lot Chris, i was about to reinstall my debian virtual box, and i forgot i could use an arch iso, i forgot once to edit the sudo file on the arch linux config and i booted up the iso to fix it, but it didn't came to my mind i could use the passwd command to reset the password👍
Hey, Chris, you just saved me with single user mode. I didn't need to change a password, but there was something messed up with sddm not having any sessions and not being able to get to a tty because it kept kicking me back to sddm. In this case, after _quiet_ I had to use _init=/bin/bash_ to enter single user mode, but it at least let me disable my sddm service until I can repair it properly.
Passwords are just simply entries in a text file and are easy to change. The only problem is that Linux also uses your password to encrypt some things like your keyring/password store, if you use that. This is probably not an issue for root but definitely for regular accounts.
Hi thanks for your videos. Could you please make one on how to incorporate the features one wants from other distros to "mix and match" especially the feature of Mx Linux where one can actually make an image of current system to install on other machines
I was dual booting Windows and Manjaro recently and accidentally wiped the Manjaro bootloader. I used that chroot technique to re-install Grub so I could log back in. I used to think it was pronounced: shuh-root !
Certainly! Here is an entire video I did on the bootloader themes: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-BAyzHP1Cqb0.html I even made an open source github project to auto install it on your Linux: github.com/ChrisTitusTech/Top-5-Bootloader-Themes
I've actually used that second technique on a client computer who forgot their root user password. It's actually a nice hidden secret because with it, you could LITERALLY break into any users system with this technique.
@@Bagginsess why not. At least why not the second one? If you can boot a standalone image, what prevents you from mounting the critical file systems and then issuing a chroot command to change your root and run the passwd command? The same works in Solaris, and even SunOS when it was a BSD based Unix in the early 1990s. The only way this won't work, as others have mentioned, is if the filesystem or volume is encrypted. But with unencrypted volumes, there is little to prevent someone from booting another instance, say from installation media, mounting the critical file systems of the image you need to get into, issuing a chroot command to change the root directory of the current shell to the newly mounted file system, and then take advantage of your root privileges to set a root password in that mounted file system. This is likely an approach that is broadly cross distribution. Probably works on most *n?x distributions that have a chroot command.
Much Mahalo to you for this Linux mint hint. I tried another YT video, but did not work. Your vid was next and a BIG MAHALO for your knowledge. I am already a subscriber . Love the Vids C0LDST33L Honolulu, Hawaii
Can you do a video on full disk encryption in ubuntu and on LUKS in general? And also on how much of a performance hit should we expect? Cuz this here screams "insecure"
When you install Arch you will learn this. When i was new i used this to fix what ever i occationally bricked hehe. Was actually one of the things i loved with Arch.
@@redrush-hp9li Guess you havnt tried Arch. Its not a matter of forgotten password or not. What is done here is also something you do during the install.
@@Luftbubblan i have used arch for six months and don’t know what you mean the closest thing i had to knowing what you mean was when i installed artix i had to reboot into the live cd because i forgot to set a password so i had to chroot and passwd
I did this kind of thing once on my grandmother's old Mac laptop because she forgot her password. I can't for the life of me remember how I found out how to do it on a Mac. It's really strange to think that there's such an easy way to get root access on these platforms without needing more than five minutes of physical access.
Physical access was (and still is) considered something very hard to get. If you have some sensitive storage, you really don't want bad guys anywhere nearby as it's nightmarishly difficult and usually infeasible to cover the entirety of the attack surface in that case. Without disk encryption, the task of stealing data is trivial. With it, there are still things such as the Evil Maid (TPM largely mitigates this one but there's always something more advanced like cold boot attacks...). Point is, the single most important question in security is "which attacks might you reasonably expect, how much they would cost you to defend against and how much a breach would cost you?". You probably don't have 4 layers of reinforced doors with couple dozen locks, biometrics and whatnot installed at your place. For someone with just a couple of hours of physical access and everyone nearby being completely oblivious to noise and lights it is likely relatively easy to get in. When you look at common solutions in physical asset security, they are almost as bafflingly easy to bypass. Yet they work quite well for most people.
Hmm. I use a livecd, mount the partition, backup /etc/shadow and then just clear the password entered in the file, and then reboot. Downside is you must have physical access to the machine.
Hi A little question how do you recommend entering the world of linux and unixI work for two years as a helpdesk in a big company (iscar) and want to promote me and teach me this world of linux
Is this possible to do with Windows as well? I've had one PC with logged microsoft account where one of my family members forgot the password and we couldn't reset it so I just had to perform a clean reinstall.
This will not work on Windows. There are other methods you can use to change a windows password but they can be difficult depending on the version of Windows you are running.
With the first method - how do I enter my root password? I entered single, hit f10, and it it asks to give root password of press control f10. But it won’t allow me input root password. Any help would be great!
@@adfjasjhf The video I followed was called "Reset Windows 10 Password with USB [Tutorial]" by MDTechVideos. But that video was for an offline account.
The fact that these exist terrifies me... because it does mean that there is basically no security against local unauthorised access. The same does apply to Windows, so it's not a Linux specific thing... but it's still a terrifying weakness.
sort comments by top comments, there is a comment that says edit the linux line in grub and place init=/bin/sh at the end, and another one i saw was to remount the drive with mount -rw -o remount / once you get to the command line prompt
today is my 4th day looking for how to bypass i guess the default grub password to be able to reset my root password huge problem nd running out of time
Would we not want our user account to be secure from password being reset by anyone in the first place? I'd appreciate a video how to remove these options next if possible. Thanks Chris!
I have a Linux box that is all locked up. I tried both these ways from forums I found online. For some reason my boot menu is locked so I wasn’t able to select the arch distro, any thought on that?
@@act.13.41 agreed, is I was on a pc. I think the trouble I’m having is because I’m using an old iMac. I’ve tried all the common keys to trigger the grub menu, to no avail
@@MatthewStinar can someone find a way to crack or bypass my encryption password? It's 22 characters long with symbols, upper and lower case letters and numbers.
Please explain me if it's so damn easy to changre root passwd, why linux is considered a really secure OS? I'm really interested, and not trolling anyone. Thanks!
Linux is secure against remote access but theres nothing you can really do to prevent this kinda thing unless you encrypt the drive the exact same attack works on windows
HELP! Chris how can I reset my password if the grub menu is hidden? I can get to any sort of boot menu whatsoever. I have been struggling for months and feel like there might be hope after watching this.
@@OctavianTheGr8 So, let me get this clear: you're booting from the image on your drive and get to the password prompt but bypassing grub, yet when you boot from live ISO, you don't get any grub whatsoever (what happens then instead?) If the issue is with not being able to boot from an external drive, it's a BIOS thing (besides obvious boot priority shenanigans, it could be disabled explicitly or secure boot might be interfering with stuff).
@@Lodinn partly correct. I am able to load the OS from the internal drive. I set it up to automatically login (which I guess is why I forgot my password). When I attempt to get into the boot menu, grub menu, secure boot, literally anything other than booting straight into the installed os I get nothing. No trigger Keys worked I tried ecs, shift, command r and s, every F-key. I quit trying on this machine 6 months ago and pulled it out of the closet after watching this video. I had no new found luck. I ended up pulling the drive and sticking it into another machine. I was able to run a live usb with POPos and formatted the drive. I then rebuilt my iMac with the freshly formatted drive and the live usb. It then found the live usb without trouble and booted automatically. I still didn’t get to select the boot menu, but I was able to do a fresh install and it’s working fine.
@@OctavianTheGr8 If the disk is encrypted and you've set it up with zero GRUB_TIMEOUT or locked out editing grub entries, well, it's more secure now - from yourself as well. If the disk is not encrypted, the second option shown in the video would be the way out: you boot into a live usb and instead of formatting the drive, mount it and chroot there. Alternatively, carve out the password from /etc/shadow on that drive by deleting everything between the first and second semicolons (so it'd look like username::10132:0:66669:7::: instead of username:(salted hash):10132:0:66669:7:::).
Yup, this is why full disk encryption is so important. If your drive isn't encrypted it isn't secure _in any way_ . You can lock things down by disabling grub options or disabling root but if anyone can pop your drive in another machine (or boot from a live cd/usb) and just mount your volumes it is all a waste of time. Full disk encryption or go home my friends :)
@@RalphHerran easiest way to tell is does it force you to enter a password in order to even boot to the login screen? If no then it probably isn’t encrypted. If yes then it most likely is encrypted. Usually this means having to enter two passwords; one for the drive encryption and then one to login to your user account. It’s possible with Windows or OPAL drive that the drive is encrypted and it’s using the TPM to unlock but that is very uncommon with Linux installs.
This is a big vulnerability. With that in mind, in a corporate environment, you need physical access to a machine so getting around physical security is an obstacle. As for the rest, you can protect GRUB with a password, so you can boot the system normally but need to enter a password to edit the boot entry. There is "whole disk" encryption that could be used to prevent anyone from accessing the drive without the proper password/key file. If someone does gain access and just resets the root password, utilities like OpenLDAP could be used to reset it on boot once the network is initialized.
Oh, and with grub password protected, you could also lock the BIOS with a password to prevent someone using the boot menu to boot a USB or CD on most computers.
any pc is vulnerable with physical access, if you want to steal data from windows all you have to do is load up a linux usb flashdrive and mount the disk, it's the same thing with linux, but with extra steps
sort comments by top comments, there is one that says edit the linux line and place init=/bin/sh at the end, and another one i saw was to remount the drive with mount -rw -o remount / once you get to the command line prompt
everything thing i do shows PASSWORD FOR TIM....nothing f#$%ing works. any other videos show how to change passwords or this computer is going over the balcony? Many thanks
@@Lodinn It blows my mind that there still are people trying to make something serious on a joke! Just laugh about it, I could not care less what os astronauts use! Face palm on this!!!