標準ファームをアップデートしたので、 標準ファームにログインできるようにする。
root@qube:~# tail -f /var/log/messages : : Oct 30 20:30:06 qube kernel: usb 2-1: new high speed USB device using ehci_marvell and address 2 Oct 30 20:30:06 qube kernel: usb 2-1: configuration #1 chosen from 1 choice Oct 30 20:30:06 qube kernel: scsi2 : SCSI emulation for USB Mass Storage devices Oct 30 20:30:11 qube kernel: scsi 2:0:0:0: Direct-Access ViPowER VP-89118(SD1) 2.10 PQ: 0 ANSI: 4 Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] 976773168 512-byte hardware sectors (500108 MB) Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] Write Protect is off Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] 976773168 512-byte hardware sectors (500108 MB) Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] Write Protect is off Oct 30 20:30:11 qube kernel: sdc: sdc1 sdc2 sdc3 sdc4 sdc5 sdc6 Oct 30 20:30:11 qube kernel: sd 2:0:0:0: [sdc] Attached SCSI disk Oct 30 20:30:11 qube kernel: sd 2:0:0:0: Attached scsi generic sg2 type 0
root@qube:~# mkdir /tmp/root root@qube:~# mount /dev/sdc2 /tmp/root root@qube:~#
root@qube:/tmp/root/etc# grep root shadow root:$1$$Yab.IC0XLDvJlIi3/A8E40:14780:0:99999:7::: root@qube:/tmp/root/etc#あれ?アップデート前に潰してなかったか???
root のパスワードを消す
root@qube:/tmp/root/etc# vi shadow : : root@qube:/tmp/root/etc# !grep grep root shadow root::14780:0:99999:7::: root@qube:/tmp/root/etc#
root@qube:/tmp/root/etc# mv sshd_config{,.orig}
root@qube:/tmp/root/etc# cp sshd_config{.orig,}
root@qube:/tmp/root/etc# vi sshd_config
:
:
root@qube:/tmp/root/etc# !cp:s/cp/diff -u/
diff -u sshd_config{.orig,}
--- sshd_config.orig 2011-01-06 11:07:39.000000000 +0900
+++ sshd_config 2011-10-30 20:42:21.000000000 +0900
@@ -20,7 +20,7 @@
# HostKeys for protocol version 2
#HostKey /etc/ssh_host_rsa_key
#HostKey /etc/ssh_host_dsa_key
-HostKey /etc/apache/server.key
+#HostKey /etc/apache/server.key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
@@ -35,7 +35,8 @@
#LoginGraceTime 2m
#PermitRootLogin yes
-PermitRootLogin no
+#PermitRootLogin no
+PermitRootLogin yes
#StrictModes yes
#RSAAuthentication yes
@@ -55,6 +56,7 @@
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
+PermitEmptyPasswords yes
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes
@@ -71,7 +73,7 @@
# Set this to 'yes' to enable PAM authentication (via challenge-response)
# and session processing. Depending on your PAM configuration, this may
# bypass the setting of 'PasswordAuthentication'
-UsePAM yes
+UsePAM no
#AllowTcpForwarding yes
#GatewayPorts no
root@qube:/tmp/root/etc#
root@qube:/tmp/root/etc# cd / root@qube:/# umount /tmp/root root@qube:/#
yasunari@sil:~$ ssh av -l root The authenticity of host 'av (192.168.2.54)' can't be established. RSA key fingerprint is 20:f8:43:55:d3:c6:e9:a3:e3:88:95:47:60:54:a8:12. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'av' (RSA) to the list of known hosts. root@LS-AVLE23:~#だーん
|
|
← 標準ファームのアップデート |
ハックの記録 LinkStation/玄箱 をハックしよう |
→ 標準ファームの散歩 |