About Us
RSInfoMinds, a web based IT Training and Consultancy firm. It is established with high dreams in training people in IT Infrastructure Field. We provide Online and Class Room training in various fields of IT Infrastructure Management.
Join Us: http://www.facebook.com/RSInfoMinds
Mail Us: rsinfominds@gmail.com
Twitter: @RSInfoMinds
We are specialized in the below courses:
Redhat Linux Admin Redhat Linux Cluster
Redhat Virutualization IBM AIX Admin
IBM AIX Virtualization IBM AIX Cluster
HP Unix Admin HP Unix Cluster
HP Unix Virtualization Shell Scripting
Veritas Volume Manager Veritas Cluster
Oracle Core DBA VMWare
We provide training in such a way, So that you get in depth knowledge on the Courses you look for.
And we ensure you are very confident from each and every Techincal aspect that the IT Industry needs and expects from you.
We also conduct Workshops on the latest technology and the real time faculties sharing their work experiences to make you the best.
Saturday, 21 June 2014
How To Find The Users With Empty Password
/etc/shadow is the file which we look for password information.
/etc/shadow content:
===============
scott:!!:16236:0:99999:7:::
peter:!!:16236:0:99999:7:::
kevin:!!:16236:0:99999:7:::
This is actual content for a default user/new user.
[root@node1 /]# passwd -d scott
Removing password for user scott.
passwd: Success
[root@node1 /]# passwd -d peter
Removing password for user peter.
passwd: Success
[root@node1 /]# passwd -d kevin
Removing password for user kevin.
passwd: Success
scott::16236:0:99999:7:::
peter::16236:0:99999:7:::
kevin::16236:0:99999:7:::
The above is the content after remving the password for the user using the command # passwd -d
[root@node1 /]# cat /etc/shadow | awk -F: '($2==""){print $1}'
scott
peter
kevin
[root@node1 /]#
/etc/shadow content:
===============
scott:!!:16236:0:99999:7:::
peter:!!:16236:0:99999:7:::
kevin:!!:16236:0:99999:7:::
This is actual content for a default user/new user.
[root@node1 /]# passwd -d scott
Removing password for user scott.
passwd: Success
[root@node1 /]# passwd -d peter
Removing password for user peter.
passwd: Success
[root@node1 /]# passwd -d kevin
Removing password for user kevin.
passwd: Success
scott::16236:0:99999:7:::
peter::16236:0:99999:7:::
kevin::16236:0:99999:7:::
The above is the content after remving the password for the user using the command # passwd -d
[root@node1 /]# cat /etc/shadow | awk -F: '($2==""){print $1}'
scott
peter
kevin
[root@node1 /]#
Now the above script will give the list of users with EMPTY PASSWORD.
pam_tally2 - The login counter (tallying) module
I have set up PAM Authentication to lock a user accoount after 3 attempts of incorrect password.
PAM Module: pam_tally2.so
password-auth-ac:
=============
auth required pam_tally2.so deny=3 file=/var/log/tallylog
account required pam_tally2.so
PAM Module: pam_tally2.so
password-auth-ac:
=============
auth required pam_tally2.so deny=3 file=/var/log/tallylog
account required pam_tally2.so
[root@node1 /]# pam_tally2 --user test
Login Failures Latest failure From
test 0
[root@node1 /]#
login as: test
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Account locked due to 4 failed logins
Account locked due to 5 failed logins
Account locked due to 6 failed logins
Account locked due to 7 failed logins
Last login: Sun Jun 15 00:14:30 2014 from 192.168.183.1
[test@node1 ~]$
[root@node1 /]# pam_tally2 --user=test
Login Failures Latest failure From
test 6 06/15/14 00:23:20 192.168.183.1
[root@node1 /]# pam_tally2 --user=test --reset
Login Failures Latest failure From
test 6 06/15/14 00:23:20 192.168.183.1
[root@node1 /]# pam_tally2 --user=test
Login Failures Latest failure From
test 0
[root@node1 /]#
login as: test
test@192.168.183.148's password:
Last login: Sun Jun 15 00:20:07 2014 from 192.168.183.1
[test@node1 ~]$ whoami
test
[test@node1 ~]$
Subscribe to:
Posts (Atom)