****Re: ****Re: Linux Administration - Users in (any) database howto/why...
Craig White
craigwhite at azapple.com
Fri Jan 2 17:29:06 MST 2009
On Fri, 2009-01-02 at 16:40 -0700, Joe wrote:
> Good point on TLS. The /etc/ldap.secret is where I had the problem. If
> you put that file on an end users machine, wouldn't they be able to boot
> into single user mode or sudo and read that file? Doesn't that file
> provide the keys to the kingdom? Once you have full read access to the
> directory. can't you read all the user id's and hashes and gain access
> to every other system? Sorry if this was already a hackfest activity and
> I missed it.
----
sure...but if you can boot into runlevel 1, you simply make a user copy
of /etc/shadow and run a password cracker on that - should be trivial
enough to get root password from that too.
Awful easy to boot Windows with CD that resets local Administrator
password too.
Basically, a computer is an insecure device unless locked in a closet
where no hands can touch and no network to access it.
Craig
More information about the PLUG-discuss
mailing list