Imagine that you are in one of the following situations:
- You have forgotten your password to connect to personal workspace of your computer, but you want reset it.
- After a wrong manipulation, you can not access to personal data of your computer, but you want retrieve this access.
- You found a computer without supervision whom you are not the owner, but you want see the content of the file system.
With a bootable USB key on Ubuntu, you can resolve these situations, first by mounting the file system of the targeted computer with all permissions, then by changing the password of any local user, and finally by connecting to the targeted workspace and exploring the file system.
First, plug your USB drive into the target computer, choose your key as the boot device for the target computer to boot to the Ubuntu system on your USB drive. On a DELL computer, press
F12 to access this selection. This information is visible on the welcome screen of the manufacturer of your computer.
Start by choosing the following option:
Then select the
You access a device as a
If you need to access the internet, select the network entry before. To verify that you have access to the web you can ping 184.108.40.206 on the Google DNS server, then make nslookup 220.127.116.11 to check that the DNS resolution works. If that does not work, add this line nameserver 18.104.22.168 to the file /etc/resolv.conf (this will be deleted when you restart the computer) and restart your service network-manager with service network-manager restart.
For the moment the file system is only in
read only, type the following command to mount the file system in
read / write at the root of your key:
mount -o remount, rw /
Now you can copy the file system to an external hard drive, and then you can choose the new user password by typing:
If you do not know the users on this machine, you can do ls /home. Certainly a user of this machine corresponds to a directory name in /home/, or even view the file /etc/passwd, or else you can create a user as you are root.
Type in the new password and confirm.
You can shut down the computer.
shutdown -h now
You can now turn on the computer normally and log in with the chosen user and password.
Beware the morality of this article is that a person physically accessing your computer does not need login/password to access your computer. If you want to protect yourself from this attack, you must encrypt your hard drive.
Well done !