console none unknown off secure
That's an interesting trick I did not know until now.if you have another working account and /tmp on / (not a separate fs) you can try with init_script loader var (see init(8))
per init(8), theWe're not able to do the same trick as Linux by changing init to /bin/bash at the grub prompt to bypass a secure console because the kernel will only allow you to use /sbin/init and an alternate hardcoded in the kernel.
init_exec
loader var "instructs init to directly execute that file as the very first action, replacing init as PID 1", so i think you could set that to /bin/sh
and get the same effect as linux's init=/bin/sh
.This is the best advice for SpruitBB - no hassle, justper init(8), theinit_exec
loader var "instructs init to directly execute that file as the very first action, replacing init as PID 1", so i think you could set that to/bin/sh
and get the same effect as linux'sinit=/bin/sh
.
set init_exec=/bin/sh
in loader and off he goes.per init(8), theinit_exec
loader var "instructs init to directly execute that file as the very first action, replacing init as PID 1", so i think you could set that to/bin/sh
and get the same effect as linux'sinit=/bin/sh
.
OK set init_exec=/bin/sh
set init_exec=/bin/sh
OK boot
boot
Loading kernel...
/boot/kernel/kernel text=0x17cf50 text=0xd74bd8 text=0x42ebb4 data=0x180+0xe80 data=0x1884e0+0x477b20 0x8+0x18c618+0x8+0x1b0092
Loading configured modules...
..
..
uhub2: 7 ports with 7 removable, self powered
#
# zfs set readonly=off rpool/ROOT/default
zfs set readonly=off rpool/ROOT/default
# passwd
passwd
Changing local password for root
New Password:asd
Retype New Password:asd
# grep ^con /etc/ttys
grep ^con /etc/ttys
console none unknown off insecure
#
physical access, absent FDE, is largely 'game over' in terms of defense. back in college we had a CD that would boot a Windows 2000 install, hotpatching the security internals, such that you could log in as Administrator with a null password.EDIT: Looks like FreeBSD is just as vulnerable to hacking as Linux is. Not good.
Of course.physical access, absent FDE, is largely 'game over' in terms of defense. back in college we had a CD that would boot a Windows 2000 install, hotpatching the security internals, such that you could log in as Administrator with a null password.
You can divide VMs into folders and set permissions on them. You can create custom roles, assign them to user and those users can be then assigned to given folders. So not true that everyone with VMware access has access to the console.The real problem is for VMware VMs. Anyone with Vsphere access would have access to the console. Of course one would need a Vshpere login but that won't protect from the VMware team. (Over 10k Windows, Linux and Solaris servers in total.)
I understand. I often look at my wife sideways, too.My servers are in my basement. Only my wife and I am here. Not a big deal but certainly an issue.
You can divide VMs into folders and set permissions on them. You can create custom roles, assign them to user and those users can be then assigned to given folders. So not true that everyone with VMware access has access to the console.
Compomising DC access - it depens. Yes, if you have servers in some SOHO, then probably you can access them more easily. We do have some servers in military base and in nuclear plants. Try to get physical access there.