標準ファームをアップデートしたので、 標準ファームにログインできるようにする。
root@qube:~# tail -f /var/log/messages : : Oct 30 20:30:06 qube kernel: usb 2-1: new high speed USB device using ehci_marvell and address 2 Oct 30 20:30:06 qube kernel: usb 2-1: configuration #1 chosen from 1 choice Oct 30 20:30:06 qube kernel: scsi2 : SCSI emulation for USB Mass Storage devices Oct 30 20:30:11 qube kernel: scsi 2:0:0:0: Direct-Access ViPowER VP-89118(SD1) 2.10 PQ: 0 ANSI: 4 Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] 976773168 512-byte hardware sectors (500108 MB) Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] Write Protect is off Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] 976773168 512-byte hardware sectors (500108 MB) Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] Write Protect is off Oct 30 20:30:11 qube kernel: sdc: sdc1 sdc2 sdc3 sdc4 sdc5 sdc6 Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] Attached SCSI disk Oct 30 20:30:11 qube kernel: sd 2:0:0:0: Attached scsi generic sg2 type 0
root@qube:~# mkdir /tmp/root root@qube:~# mount /dev/sdc2 /tmp/root root@qube:~#
root@qube:/tmp/root/etc# grep root shadow root:$1$$Yab.IC0XLDvJlIi3/A8E40:14780:0:99999:7::: root@qube:/tmp/root/etc#あれ?アップデート前に潰してなかったか???
root のパスワードを消す
root@qube:/tmp/root/etc# vi shadow : : root@qube:/tmp/root/etc# !grep grep root shadow root::14780:0:99999:7::: root@qube:/tmp/root/etc#
root@qube:/tmp/root/etc# mv sshd_config{,.orig} root@qube:/tmp/root/etc# cp sshd_config{.orig,} root@qube:/tmp/root/etc# vi sshd_config : : root@qube:/tmp/root/etc# !cp:s/cp/diff -u/ diff -u sshd_config{.orig,} --- sshd_config.orig 2011-01-06 11:07:39.000000000 +0900 +++ sshd_config 2011-10-30 20:42:21.000000000 +0900 @@ -20,7 +20,7 @@ # HostKeys for protocol version 2 #HostKey /etc/ssh_host_rsa_key #HostKey /etc/ssh_host_dsa_key -HostKey /etc/apache/server.key +#HostKey /etc/apache/server.key # Lifetime and size of ephemeral version 1 server key #KeyRegenerationInterval 1h @@ -35,7 +35,8 @@ #LoginGraceTime 2m #PermitRootLogin yes -PermitRootLogin no +#PermitRootLogin no +PermitRootLogin yes #StrictModes yes #RSAAuthentication yes @@ -55,6 +56,7 @@ # To disable tunneled clear text passwords, change to no here! #PasswordAuthentication yes #PermitEmptyPasswords no +PermitEmptyPasswords yes # Change to no to disable s/key passwords #ChallengeResponseAuthentication yes @@ -71,7 +73,7 @@ # Set this to 'yes' to enable PAM authentication (via challenge-response) # and session processing. Depending on your PAM configuration, this may # bypass the setting of 'PasswordAuthentication' -UsePAM yes +UsePAM no #AllowTcpForwarding yes #GatewayPorts no root@qube:/tmp/root/etc#
root@qube:/tmp/root/etc# cd / root@qube:/# umount /tmp/root root@qube:/#
yasunari@sil:~$ ssh av -l root The authenticity of host 'av (192.168.2.54)' can't be established. RSA key fingerprint is 20:f8:43:55:d3:c6:e9:a3:e3:88:95:47:60:54:a8:12. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'av' (RSA) to the list of known hosts. root@LS-AVLE23:~#だーん
|
← 標準ファームのアップデート |
ハックの記録 LinkStation/玄箱 をハックしよう |
→ 標準ファームの散歩 |