Imagine that you are in one of the following situations:
- You have forgotten your password to connect to the personal workspace of your computer, and you want to reset it.
- After a wrong manipulation, you can not access to personal data of your computer, and you want to retrieve this access.
- You found a computer without supervision for whom you are not the owner but want to see the file system’s content.
With a bootable USB key on Ubuntu, you can resolve these situations, first by mounting the file system of the targeted computer with all permissions, then by changing the password of any local user, and finally by connecting to the targeted workspace and exploring the file system.
First, plug your USB drive into the target computer, and choose your key as the boot device for the target computer to boot to the Ubuntu system on your USB drive. On a DELL computer, press
F12 to access this selection. This information is visible on the welcome screen of your computer’s manufacturer.
Start by choosing the following option:
Then select the
You access a device as a
If you need to access the internet, select the network entry before. To verify that you have access to the web you can ping 126.96.36.199 on the Google DNS server, then make nslookup 188.8.131.52 to check that the DNS resolution works. If that does not work, add this line nameserver 184.108.40.206 to the file /etc/resolv.conf (this will be deleted when you restart the computer) and restart your service network-manager with service network-manager restart.
For the moment, the file system is only in
read only, type the following command to mount the file system in
read / write at the root of your key:
mount -o remount, rw /
Now you can copy the file system to an external hard drive, and then you can choose the new user password by typing:
If you do not know the users on this machine, you can do ls /home. Certainly, a user of this machine corresponds to a directory name in /home/, or even view the file /etc/passwd, or else you can create a user as you are root.
Type in the new password and confirm.
You can shut down the computer.
shutdown -h now
You can now turn on the computer normally and log in with the chosen user and password.
Beware, the morality of this article is that a person physically accessing your computer does not need login/password to access your computer. If you want to protect yourself from this attack, you must encrypt your hard drive.
Well done !