View Single Post
Old 01-08-2017, 04:40 PM   #2547
knc1
Going Viral
knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.
 
knc1's Avatar
 
Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
Quote:
Originally Posted by moontear View Post
This is all news to me. Awesome!

However no dice. With ssh Just using username:<ENTER> and password: <ENTER> still gets me access denied. Via WiFi and as well via usb cable. Enabling the dropbear banner I get a "Welcome to Kindle" Banner after the username, but still have to enter the password and empty doesn't work.

Telnet works right away and I also seem to be root (didn't know there was telnet, great). Short of just trying to use John the Ripper to get to the root password, what else can I try? Or should I just set up PubKey auth via telnet and be done with it - whatever the password is?

------------
WAIT: I tried again with user: root, password: <empty>/<ENTER> and it works.

I don't know what the hell changed but... it works now. Thanks for the heads up knc1. I'll set up pukey auth now and already changed the root password to something I can remember. Better than empty ;-)
Previous to your screwing with the password database,
password authentication for root was disabled.

It was not the password database that allowed you to log in over the usb cable, it was our special build of dropbear.

Before your change, the root password could not be 'hacked' - because the system did not allow any to be used.
But now you changed that, now it can be 'hacked' - especially because it is easy for a human to remember.
It would be best if you put /etc/passwd and /etc/shadow back the way you found them.
(or wait for the next update, which will over-write them)

Last edited by knc1; 01-08-2017 at 04:43 PM.
knc1 is offline   Reply With Quote