Global Information Lookup Global Information

Passwd information


passwd
Original author(s)AT&T Bell Laboratories
Developer(s)Various open-source and commercial developers
Operating systemUnix, Unix-like, Plan 9, Inferno
PlatformCross-platform
TypeCommand

passwd is a command on Unix, Plan 9, Inferno, and most Unix-like operating systems used to change a user's password. The password entered by the user is run through a key derivation function to create a hashed version of the new password, which is saved. Only the hashed version is stored; the entered password is not saved for security reasons.

When the user logs on, the password entered by the user during the log on process is run through the same key derivation function and the resulting hashed version is compared with the saved version. If the hashes are identical, the entered password is considered to be correct, and the user is authenticated. In theory, it is possible for two different passwords to produce the same hash. However, cryptographic hash functions are designed in such a way that finding any password that produces the same hash is very difficult and practically infeasible, so if the produced hash matches the stored one, the user can be authenticated.

The passwd command may be used to change passwords for local accounts, and on most systems, can also be used to change passwords managed in a distributed authentication mechanism such as NIS, Kerberos, or LDAP.

and 19 Related for: Passwd information

Request time (Page generated in 0.5376 seconds.)

Passwd

Last Update:

passwd is a command on Unix, Plan 9, Inferno, and most Unix-like operating systems used to change a user's password. The password entered by the user is...

Word Count : 1941

Name Service Switch

Last Update:

mechanisms. These sources include local operating system files (such as /etc/passwd, /etc/group, and /etc/hosts), the Domain Name System (DNS), the Network...

Word Count : 582

Directory traversal attack

Last Update:

the root directory, and then include the Unix password file /etc/passwd. Unix /etc/passwd is a common file used to demonstrate directory traversal, as it...

Word Count : 1149

Getent

Last Update:

in a number of important text files called databases. This includes the passwd and group databases which store user information – hence getent is a common...

Word Count : 312

Setuid

Last Update:

thompson ~ ] $ stat -c "%a %U:%G %n" /usr/bin/passwd 4701 root:root /usr/bin/passwd [ thompson ~ ] $ passwd passwd: Changing password for thompson The owner...

Word Count : 2016

Group identifier

Last Update:

must have GID 0. This numeric value is used to refer to groups in the /etc/passwd and /etc/group files or their equivalents. Shadow password files and Network...

Word Count : 739

Gecos field

Last Update:

The gecos field, or GECOS field is a field in each record in the /etc/passwd file on Unix and similar operating systems. On UNIX, it is the 5th of 7 fields...

Word Count : 286

Chsh

Last Update:

the shell interactively. chsh is a setuid program that modifies the /etc/passwd file, and only allows ordinary users to modify their own login shells. The...

Word Count : 780

Vipw

Last Update:

of user and group files that can be modified by the vipw utility. “/etc/passwd“: User account information. “/etc/shadow“: Secure user account information...

Word Count : 151

XML external entity attack

Last Update:

> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY xxe SYSTEM "file:///etc/passwd" >]><foo>&xxe;</foo> <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE...

Word Count : 841

Network Information Service

Last Update:

UNIX environment, the list of users for identification is placed in /etc/passwd and secret authentication hashes in /etc/shadow. NIS adds another "global"...

Word Count : 580

Lastlog

Last Update:

that order. The users are sorted by default according to the order in /etc/passwd However, it can also be used to modify the records kept in /var/log/lastlog...

Word Count : 155

Defensive programming

Last Update:

reject accessing the file "/etc/passwd", a cracker might pass another variant of this file name, like "/etc/./passwd". Canonicalization libraries can...

Word Count : 1800

Unix shell

Last Update:

user, is typically stored in the user's profile, for example in the local passwd file or in a distributed configuration system such as NIS or LDAP; however...

Word Count : 1733

Gecos

Last Update:

Comprehensive Operating System (GCOS) gecos field, an entry in the /etc/passwd file containing personal data about the user on Unix operating systems This...

Word Count : 72

File inclusion vulnerability

Last Update:

/vulnerable.php?language=../../../../../etc/passwd%00 - allows an attacker to read the contents of the /etc/passwd file on a Unix-like system through a directory...

Word Count : 1036

Unix

Last Update:

and many others. User utilities – environment management tools such as passwd, kill, and others. Document formatting – Unix systems were used from the...

Word Count : 5614

Superuser

Last Update:

control over the machine. Hypervisor Jailbreaking (iOS) nobody (username) passwd Power user Privilege escalation Rooting (Android OS) Rootkit sudo Wheel...

Word Count : 1508

Login manager

Last Update:

no longer maintained ConsoleKit. BSD Authentication Name Service Switch passwd Pluggable authentication module "Configuring Login Manager". Solaris Common...

Word Count : 161

PDF Search Engine © AllGlobal.net