Translates from English

Imagine that you are in the following situation:

  1. You have forgotten your password,
  2. Following a wrong manipulation you can not access to your personal space anymore,
  3. You found a computer without supervision.

With a bootable USB key on Ubuntu, you can change the password of the target computer and recover its file system.

First, plug your USB drive into the target computer, choose your key as the boot device for the target computer to boot to the Ubuntu system on your USB drive. On a DELL computer, press F12 to access this selection. This information is visible on the welcome screen of the manufacturer of your computer.

DELL welcome screen
DELL welcome screen

Start by choosing the following option:

Advanced startup options
Advanced startup options

Then select the recovery mode:

Getting started in recovery mode
Getting started in recovery mode

Launch a root shell:

Choosing the root shell
Choosing the root shell

You access a device as a root user.

If you need to access the internet, select the network entry before. To verify that you have access to the web you can ping on the Google DNS server, then make nslookup to check that the DNS resolution works. If that does not work, add this line nameserver to the file /etc/resolv.conf (this will be deleted when you restart the computer) and restart your service network-manager with service network-manager restart.

For the moment the file system is only in read only, type the following command to mount the file system in read / write at the root of your key:

mount -o remount, rw /

Now you can copy the file system to an external hard drive, and then you can choose the new user password by typing:

passwd <username>
If you do not know the users on this machine, you can do ls /home. Certainly a user of this machine corresponds to a directory name in /home/, or even view the file /etc/passwd, or else you can create a user as you are root.

Type in the new password and confirm.

You can shut down the computer.

shutdown -h now

You can now turn on the computer normally and log in with the chosen user and password.

Beware the morality of this article is that a person physically accessing your computer does not need login /password to access your computer. If you want to protect yourself from this attack, you must encrypt your hard drive.

Well done :smile:!

Creative Commons Attribution 4.0 International License:

Also read