View Single Post
Old 11-12-2020, 01:14 PM   #4
lordeagle
Enthusiast
lordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankindlordeagle has exceeded all limitations known to mankind
 
Posts: 49
Karma: 17448
Join Date: Jun 2020
Device: Kobo Elipsa2E & Libra H20, Kindle PW3 & PW2
Quote:
Originally Posted by NiLuJe View Post
It is, the root account is locked.
It is locked? But I am able to login without any password. Isn't that the point of the first steps of a JB ... to get root access?

Or how is the user locked? Obviously something with the passwd procedure is dubious ... but I don't see what exactly. I see that /etc/shadow is updated after executing 'passwd' on a RW mounted partition.

Furthermore I know that I have a PW3 (5.9.6) which has a password protected root account (with a password that I gave). Back there I could use the convenient software JB. This time I followed the serial JB as I am on (5.12.5) with the new device.

So I'd assume that it has anything to do with the JB procedure? Does the JB process apply any special hacks to keep the 'root' acc protected which I could disable temporary to enforce my pass?
lordeagle is offline   Reply With Quote