Resetting root password in Linux using Backtrack


Steps for resetting password of root to ‘sctfroot’ using backtrack.

Step1: Boot the backtrack cd and log in as root.

Step2: find the partition in which the linux is installed using cmd
$fdisk-l                                        //we are already loged in as root hence its not required to use sudo cmd anywhere.

Step3: suppose linux is installed in partition /dev/sda6 then make a directory name sda6 in mnt directory and mount that partition to it using following cmd(s)
$mkdir /mnt/sda6                             //make sda6 in mnt directory  
$mount /dev/sda6 /mnt/sda6

Step4: cd /mnt/sda6                                  //entering in sda6

Step4: change the permission of passwd file to 755
$chmod 755 passwd                             //check comments in step2

Step5: open passwd file
$vi /etc/passwd

Step6: Find root and delete the whatever is there in between the first ‘:’ and second ‘:’ and save the file.It will make the root password less.
root:x:0:0:root:/root:/bin/bash                //before

root::0:0:root:/root:/bin/bash               //after 

Step7: Now remove backtrack and restart the computer and open in grub mode(recovery mode) and you will find the root prompting at cmd line without asking for password.Now use passwd cmd to change passwd of root to sctfroot.

$passwd root
and type password as ‘sctfroot’ when it is asked.

Note: You can prevent him from hacking your sytem by setting a Bios password(so that he can’t access your system without cracking your bios password 😀 ).


DNS Virus (Internet dooms day)

On Monday,9 july 2012, the FBI turned off servers that had allowed thousands of malware-stricken computers to continue using the Internet. The personal computers – both Windows PCs and Macs – are corrupted by a virus known as DNSChanger. Without the servers, the machines wouldn’t know how to locate websites and send email.

Years ago, an Estonian company Rove Digital created a malware that managed to trick millions of people into installing the DNSChanger software, which changed certain computer settings. With the change, victim’s computer went to a rogue server rather than a legitimate one at their company or Internet service provider. From there, the scammers were able to send victims to websites containing rogue ads from which they profited.

How were the servers supposed to function?

Databases known as domain name servers translate Internet addresses such as “” into a series of numbers your computer needs to locate other Internet-connected machines. Think of it as the Internet’s version of directory assistance for telephone numbers. If you need the number for Acme’s Flowers, you call “411” to ask for it.

How the scam worked?

In the simplest terms, think of it as “411” calls that were rerouted to a directory-assistance service operated by the scammers. You call it to ask for Acme’s Flowers, but the service gives you the number for a flower shop run by the mob. The shop still fulfills the order, so you don’t suspect anything, but it might use stolen flowers and baskets.

According to federal authorities, there were variations on how the scammers profited.

In some cases, only the ads were changed. For example, authorities say, people who went to ESPN’s website saw an ad for a timeshare business rather than the Dr. Pepper ad that was supposed to be there. In such cases, those people were still going to ESPN’s website. Normally, your computer would grab the ad displayed on ESPN from a separate, legitimate ad-placement company. Authorities say the affected computers were tricked into grabbing the scammers’ ad instead.

In other cases, authorities say, people searching through Google or Yahoo were sent to a fake search engine. They got search results that looked like Google’s or Yahoo’s but contained links to unauthorized sites. For example, people trying to reach the IRS site instead got H&R Block’s, without the tax preparer’s knowledge. Authorities say scammers got payments for referrals.

The FBI said the scam netted at least $14 million.

If this has been going on for years, why did it become a problem Monday?

Authorities busted the ring in November and arrested six suspects. The rogue databases were replaced with legitimate ones, but they were always meant to be temporary and did nothing to change the settings on individual computers. In other words, the troubled computers were still looking for databases at the rogue locations, but legitimate databases were set up at those rogue locations.

Those databases were turned off Monday with the expiration of a court order, so infected computers are now looking for databases that don’t exist. Without the information, computers don’t know where to find websites.

Continuing the phone analogy, the “411” calls during the transition period didn’t go to the usual directory-assistance service but one operated on behalf of the FBI. You’d get the correct Acme’s Flowers, not the mob operation. Since the temporary service shut down Monday, “411” calls essentially go to a disconnected line.

Are the infected computers now offline?

Not really. If your computer is corrupted, you can still reach websites if you know their numeric Internet address. But chances are, you don’t. So you are effectively offline. Imagine if all your contacts in your cellphone got wiped out. How many people would you be able to call?

In addition, some service providers are redirecting traffic on the back end so that they still reach legitimate databases.

How many computers are affected?

At the time of the arrests in November, the FBI said about 4 million computers had the rogue settings, including about 500,000 in the US Some were home computers, while others were on employees’ desks at major businesses and government agencies, including NASA. Many of the computers had been fixed since then, with the settings restored to reach normal, permanent databases. As of late Sunday, just before the temporary databases were turned off, the FBI believes about 211,000 were still affected worldwide, including 41,800 in the US.

What has been done to fix the computers infected with DNSChanger?

For months, the FBI and private companies have been sending general warnings about the deadline. Some Internet service providers and the social-networking service Facebook Inc. also have been directly notifying people they believe still have infected computers. Some Facebook users, for instance, got a message on their screen warning them that access to websites, emails and chat would end Monday if they didn’t correct the problem. They were given a website with more information on detecting and fixing the problem.

Nonetheless, many computers remained infected. Many users didn’t understand what was going on, let alone how to fix the problem. And some thought the warnings themselves were scams, or at least an effort by the government to spy on them.

What happens if my computer is still infected?

Several security companies have free tools to scan your computer and remove this and other threats. Chances are if you are reading this on the Internet after Monday,9 july 2012, your computer is OK. You can go to to make sure. Even if your computer is clean, it’s a good idea to have it scanned regularly or install security software that does it automatically on a regular basis.

More details on fixing your computer can be found here: .