This is an old revision of the document!
To explore the various methods of breaking into any Linux system that doesn't use FDE (Full Disk Encryption) through physical access. Also, to examine the procedure of FDE setup and other remediations to prevent this.
kernel=/vmlinuz-<version> [...parameters...] init=/bin/bash
DONE! THAT'S ALL FOLKS! After the target machine finishes booting, the kernel will detect the hardware and immediately drop you into a root shell. Since the system initialization script '/etc/rc.d/rc.sysinit' was bypassed and NOT executed, we need to remount the root file system and make some changes to make the system more usable.:
# mount /proc
You will see an error message complaining that it was already mounted. Ignore it.
mount -o remount,rw /
# cat /etc/fstab
Mount any other needed file systems (Like '/home', '/usr', etc.).
passwd root
adduser -D -u 1000 bad-user passwd bad-user
visudo bad-user ALL=(ALL) ALL
kernel=/vmlinuz-version ro root=LABEL=/ [...other-parameters...] S
enforcing=0
su -
and mount the file systems as needed.
# grub-md5-crypt
and follow the directions.
# ... comments above ... default=0 timeout=5 password --md5 5f3782baec534bae412c27fc0850fc6d spashimage=(hd0,0)/grub/splash.xpm.gz hiddenmenu ......
# which sulogin
si::sysinit:/etc/rc.d/rc.sysinit
then you have traditional init.
# System initialization si::sysinit:/etc/rc.d/rc.sysinit ss:S:respawn:/sbin/sulogin # added line
SINGLE=/sbin/sushell
to this:
SINGLE=/sbin/sulogin
start on runlevel S stop on runlevel [!S] console owner script if [ -x /usr/share/recovery-mode/recovery-menu ]; then exec /usr/share/recovery-mode/recovery-menu else exec /sbin/sulogin fi end script [...]
In performing this project, the following resources were referenced: