Similar topics
Most active topics
Social bookmarking
Bookmark and share the address of warez forum on your social bookmarking website
Bookmark and share the address of SEO Forum on your social bookmarking website
How To Password Protect Your Linux Box (OS) With GRUB
Page 1 of 1
How To Password Protect Your Linux Box (OS) With GRUB
GRUB, the Only bootloader for Linux OS, as NTLDR works in windows..
here
, the basic idea for Securing the Linux box wiht GRUB is, we implies
sum security on GRUB itself..The MOst basic Phase in Loading Of An
Operating System.
However
, Gettin bypassed with GRUb is also not that much difficult, its as
easy as Burning a MATCH STICk, bt guys, i wud tell u that somehow later.
So
wt the basic idea is, If you don't want someone booting your machine
without permission, you can add a password to your GRUB entries. You can
add a password only to specific entries if you wish; this will require a
user to enter a password before loading only those boot entries you
protect. This can be useful when done on your Recovery Mode entries,
which bring up a passwordless root login by default.
To get started, let's first encrypt the password we want to use. Open up a terminal and enter the grub command. This brings up a grub shell. In this shell, enter the md5crypt
command. When prompted, type in the password you want on your grub
entries. (Don't worry, this won't write anything to your files!) After
pressing Enter, you will be given an encrypted password string. Copy the
string to your clipboard. Enter quit to exit the grub shell and return to bash.
Code:
add it to grub. Using sudo, open up /boot/grub/menu.lst using your
favorite text editor.
Note
: if ur version of linux Box does not Encrypts password as such, Then
you may have to Copy The encrypted passwrd frm the Shadow Fiel..(If U r
having this case, do ask me, n i wud tell u the whole game IN step wise
step manner)
After the "initrd" line for each entry you want to password protect, start a new line beginning with password --md5 and paste in your newly-encrypted password. Using the above example password on the i386 recovery entry, this:
Code:
Code:
must add such a line after every entry you want to password protect. As I
mentioned earlier, I password protected my recovery mode entries out of
sheer paranoia.
Save the file, and reboot. (The first time you try this, I suggest only
doing it to one entry so you can test it to make sure it works, and you
can still use another entry to boot your machine in case something went
wrong.)
For a bit of added peace of mind, you can prevent everyone except root from reading /boot/grub/menu.lst by doing:
Code:
______________________________________________________________________________
Thats it u r finished with it.
here
, the basic idea for Securing the Linux box wiht GRUB is, we implies
sum security on GRUB itself..The MOst basic Phase in Loading Of An
Operating System.
However
, Gettin bypassed with GRUb is also not that much difficult, its as
easy as Burning a MATCH STICk, bt guys, i wud tell u that somehow later.
So
wt the basic idea is, If you don't want someone booting your machine
without permission, you can add a password to your GRUB entries. You can
add a password only to specific entries if you wish; this will require a
user to enter a password before loading only those boot entries you
protect. This can be useful when done on your Recovery Mode entries,
which bring up a passwordless root login by default.
To get started, let's first encrypt the password we want to use. Open up a terminal and enter the grub command. This brings up a grub shell. In this shell, enter the md5crypt
command. When prompted, type in the password you want on your grub
entries. (Don't worry, this won't write anything to your files!) After
pressing Enter, you will be given an encrypted password string. Copy the
string to your clipboard. Enter quit to exit the grub shell and return to bash.
Code:
- Code:
GNU GRUB version 0.95 (640K lower / 3072K upper memory)
[ Minimal BASH-like line editing is supported. For the first word, TAB
lists possible command completions. Anywhere else TAB lists the possible
completions of a device/filename. ]
grub> md5crypt
Password: *************
Encrypted: $1$w7Epf0$vX6rxpozznLAVxZGkcFcs.
grub>
add it to grub. Using sudo, open up /boot/grub/menu.lst using your
favorite text editor.
Note
: if ur version of linux Box does not Encrypts password as such, Then
you may have to Copy The encrypted passwrd frm the Shadow Fiel..(If U r
having this case, do ask me, n i wud tell u the whole game IN step wise
step manner)
After the "initrd" line for each entry you want to password protect, start a new line beginning with password --md5 and paste in your newly-encrypted password. Using the above example password on the i386 recovery entry, this:
Code:
- Code:
title Ubuntu, kernel 2.6.8.1-2-386 (recovery mode)
root (hd1,2)
kernel /boot/vmlinuz-2.6.8.1-2-386 root=/dev/hdb3 ro single
initrd /boot/initrd.img-2.6.8.1-2-386
Code:
- Code:
title Ubuntu, kernel 2.6.8.1-2-386 (recovery mode)
root (hd1,2)
kernel /boot/vmlinuz-2.6.8.1-2-386 root=/dev/hdb3 ro single
initrd /boot/initrd.img-2.6.8.1-2-386
password --md5 $1$w7Epf0$vX6rxpozznLAVxZGkcFcs.
must add such a line after every entry you want to password protect. As I
mentioned earlier, I password protected my recovery mode entries out of
sheer paranoia.
Save the file, and reboot. (The first time you try this, I suggest only
doing it to one entry so you can test it to make sure it works, and you
can still use another entry to boot your machine in case something went
wrong.)
For a bit of added peace of mind, you can prevent everyone except root from reading /boot/grub/menu.lst by doing:
Code:
- Code:
sudo chmod 600 /boot/grub/menu.lst
______________________________________________________________________________
Thats it u r finished with it.
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
Fri Nov 02, 2012 8:13 am by krishdell
» Buy PVA Hotmail Accounts
Tue Oct 23, 2012 7:00 am by kristendesouza
» Buy Twitter Followers | Buy Bulk Twitter Followers
Sat Oct 06, 2012 3:15 am by doofymartin
» Buy Twitter Followers | Buy Bulk Twitter Followers
Sat Oct 06, 2012 3:11 am by doofymartin
» Buy Twitter Followers | Buy Bulk Twitter Followers
Sat Oct 06, 2012 3:06 am by doofymartin
» High Pr [03-09] Back Link list and do follow website's
Sat May 07, 2011 9:11 am by Admin
» [GET] FUll Free Pakage 7000+ Backlinks - BACKLINKBonanza! d0f0llow Forum Links, Blog Comments and more!
Mon May 02, 2011 6:21 am by bdconnect
» 100$/Day....1000%working Trick (only 15min/day working)
Sun Apr 24, 2011 12:08 am by Admin
» Invest 1$ and trick to increase it
Sun Apr 10, 2011 9:49 am by Admin
» 10 Steps to Buying Anything Online for $.01 by Hacking Paypal
Thu Mar 10, 2011 9:14 am by virus231
» Hacking Rapid share and mega upload
Thu Mar 10, 2011 9:11 am by virus231
» Top 11 URl Shortening services - Learn alatest Computer And Mobile Hacking Tricks
Thu Mar 10, 2011 6:26 am by virus231
» SEOmoz Guides SEO Books
Thu Mar 10, 2011 6:21 am by virus231
» Advanced Bulk Backlinks Checker
Thu Mar 10, 2011 6:19 am by virus231
» Super Hide IP 3.0.9.2 + Patch
Mon Feb 28, 2011 4:02 am by samflynn
» Scientific Toolworks Understand 2.6.554 x86/x64 + Keygen
Mon Feb 28, 2011 3:53 am by samflynn
» Joboshare DVD Copy v2.9.9.0219 + Keygen
Mon Feb 28, 2011 3:30 am by samflynn
» FlashFXP 4.0.0 Build 1539 + Patch
Mon Feb 28, 2011 3:20 am by samflynn
» Efofex FX Equation v4.004.5 + Keygen
Mon Feb 28, 2011 3:10 am by samflynn
» AceMoney 4.15.1 + Keynaker
Mon Feb 28, 2011 3:00 am by samflynn