Lost password on Macintosh

lupin

Platinum Member
Oct 11, 1999
2,944
0
0
I lost my admin password. using OSX 10.3. Anyway to retain it? Thanks.

 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Single user mode isn't an exploit. If someone has that kind of access to your computer you have more issues than that. Password single user mode? Take the hard drive.
 

drag

Elite Member
Jul 4, 2002
8,708
0
0
Boot up with the install cdrom and reset the password with the utilities provided by Apple. I don't remember what it is called exactly, probably "password reset utility" or something...

Also usefull for correcting messed up permissions (a very common malady from apple computers from the plethera of closed source software that gets installed on these type of computers that don't follow Apple's "rules" when it comes to installers.) or run other drive checks.

Single user mode isn't an exploit. If someone has that kind of access to your computer you have more issues than that. Password single user mode? Take the hard drive.

Definately the best security against something like this is a reinforced locked door. If someone evil has physical access to your computer you can kiss your security goodbye.

Any computer, linux, NT-based windows versions, *BSD, OS X, pretty much everything except some of the big iron or unusual hardware has the ability to have the password resetted in someway. And if you have that disabled or whatnot they can just take a hammer/crowbar to your computer and take the drive or entire computer if they feel like it. (its not like your not going to miss a resetted and changed password, anymore then a missing computer/harddrive)
 

Jzero

Lifer
Oct 10, 1999
18,834
1
0
Originally posted by: n0cmonkey
Single user mode isn't an exploit. If someone has that kind of access to your computer you have more issues than that. Password single user mode? Take the hard drive.

Hence "exploit" in quotes, because it's not really an exploit. However, just as with other unix/linux OSes it is a basic and sensible idea that booting into single-user mode not just dump you into a shell with root priveleges without so much as asking for a password. Not every machine can be locked away from physical access, especially user workstations.

There is no such thing as fool-proof security. You have to assume that a dedicated enough enemy will eventually break all of your security measures. You have to work under the paradigm of putting up enough roadblocks that most people will give up. We will spot a workstation with a missing hard drive much more quickly than a workstation with a compromised root password, assuming the cracker just steals data and doesn't make the machine doing anything funny.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: drag
Boot up with the install cdrom and reset the password with the utilities provided by Apple. I don't remember what it is called exactly, probably "password reset utility" or something...

Also usefull for correcting messed up permissions (a very common malady from apple computers from the plethera of closed source software that gets installed on these type of computers that don't follow Apple's "rules" when it comes to installers.) or run other drive checks.

Single user mode isn't an exploit. If someone has that kind of access to your computer you have more issues than that. Password single user mode? Take the hard drive.

Definately the best security against something like this is a reinforced locked door. If someone evil has physical access to your computer you can kiss your security goodbye.

Any computer, linux, NT-based windows versions, *BSD, OS X, pretty much everything except some of the big iron or unusual hardware has the ability to have the password resetted in someway. And if you have that disabled or whatnot they can just take a hammer/crowbar to your computer and take the drive or entire computer if they feel like it. (its not like your not going to miss a resetted and changed password, anymore then a missing computer/harddrive)

Solution: encrypted disk. I've got one. Doesn't everyone?
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: Jzero
Originally posted by: n0cmonkey
Single user mode isn't an exploit. If someone has that kind of access to your computer you have more issues than that. Password single user mode? Take the hard drive.

Hence "exploit" in quotes, because it's not really an exploit. However, just as with other unix/linux OSes it is a basic and sensible idea that booting into single-user mode not just dump you into a shell with root priveleges without so much as asking for a password. Not every machine can be locked away from physical access, especially user workstations.

There is no such thing as fool-proof security. You have to assume that a dedicated enough enemy will eventually break all of your security measures. You have to work under the paradigm of putting up enough roadblocks that most people will give up. We will spot a workstation with a missing hard drive much more quickly than a workstation with a compromised root password, assuming the cracker just steals data and doesn't make the machine doing anything funny.

I don't disagree with having an option for a password to single user mode. But personally, I don't want one for my iBook.
 

drag

Elite Member
Jul 4, 2002
8,708
0
0
Solution: encrypted disk. I've got one. Doesn't everyone?

I don't, encrypted disks seem more trouble then they are worth, but I could see myself running encryption on maybe a partition or something like that for the sensitive stuff.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: drag
Solution: encrypted disk. I've got one. Doesn't everyone?

I don't, encrypted disks seem more trouble then they are worth, but I could see myself running encryption on maybe a partition or something like that for the sensitive stuff.

I don't mean an entirely encrypted system. That would be kind of silly, unless there was some kind of hardware solution... And I think it's only *really* useful in laptops (unless you are worried about people taking the hard drive out of your servers ). And OpenBSD's encrypted disk solution is pretty easy. I don't use it on my iBook though, I don't have anything "sensitive" on here really
 

drag

Elite Member
Jul 4, 2002
8,708
0
0
Originally posted by: n0cmonkey
Originally posted by: drag
Solution: encrypted disk. I've got one. Doesn't everyone?

I don't, encrypted disks seem more trouble then they are worth, but I could see myself running encryption on maybe a partition or something like that for the sensitive stuff.

I don't mean an entirely encrypted system. That would be kind of silly, unless there was some kind of hardware solution... And I think it's only *really* useful in laptops (unless you are worried about people taking the hard drive out of your servers ). And OpenBSD's encrypted disk solution is pretty easy. I don't use it on my iBook though, I don't have anything "sensitive" on here really

One thing I think would be interesting to do is instead of having a entire partition or whatnot simply have a loopback filesystem that you keep encrypted. Then if want to get REALY sneaky keep the loopback FS disguised as a coredump (while not mounted) in some backward directory deep in somewhere boring.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: drag

One thing I think would be interesting to do is instead of having a entire partition or whatnot simply have a loopback filesystem that you keep encrypted. Then if want to get REALY sneaky keep the loopback FS disguised as a coredump (while not mounted) in some backward directory deep in somewhere boring.

Do you know how to create swapfiles on Linux? Well on OpenBSD it's probably a bit similar. Basically all I had to do after that was newfs the file, associate it with a device (vnconfig), enter in a passphrase, and mount it. It can basically be named whatever I want. It has to be re-associated with a device every reboot, and I have to type in the correct passphrase for this to all work. It's not bad really. And you can do sneaky stuff like make it look like a core file
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |