Hi carloph,
sdx7 are the partitions used by md0, previously you posted its root content:
- Code: Select all
root@fvdw-sta-kirkwood:/ # ls -la /md0
total 30
drwxr-xr-x 20 root root 1024 Jul 31 2013 .
drwxr-xr-x 15 root root 580 Mar 28 09:34 ..
drwxr-xr-x 2 root root 1024 Jul 31 2013 bin
drwxr-xr-x 2 root root 1024 Dec 12 2011 boot
drwxr-xr-x 2 root root 1024 Jul 31 2013 dev
drwxr-xr-x 4 root root 1024 Jul 31 2013 etc
drwxr-xr-x 3 root root 1024 Jul 31 2013 home
drwxr-xr-x 2 root root 1024 Dec 12 2011 include
drwxr-xr-x 4 root root 1024 Jul 31 2013 lib
drwx------ 2 root root 12288 Jul 31 2013 lost+found
drwxr-xr-x 2 root root 1024 Dec 12 2011 mnt
drwxr-xr-x 2 root root 1024 Dec 12 2011 opt
drwxr-xr-x 2 root root 1024 Dec 12 2011 proc
drwxr-xr-x 2 root root 1024 Dec 12 2011 root
drwxr-xr-x 2 root root 1024 Feb 20 16:02 sbin
drwxr-xr-x 2 root root 1024 Dec 12 2011 snapshots
drwxr-xr-x 2 root root 1024 Dec 12 2011 sys
drwxr-xr-x 2 root root 1024 Dec 12 2011 tmp
drwxr-xr-x 4 root root 1024 Jul 31 2013 usr
drwxr-xr-x 6 root root 1024 Jul 31 2013 var
snaphots is the folder where md2 is mounted and then after to do it allows to get the snaps directory by the "Lacie" path /snapshots/snaps/
So if you want to search if there is another location of the other snapshots, do :
-assemble md0
- Code: Select all
mkdir /md0
mdadm --assemble /dev/md0 /dev/sd[abcde]7
mount /dev/md0 /md0
and do some ls commands on its root folders. (like ls -al /md0/home)
Note: snapshots should be empty, and no need to search on folder boot; proc and sys which are kernel system folders
Note: maybe var folder is a good candidate as md1 is also mounted on var/original
@Mijzelf
As root password is unknown, maybe telnetd.i should contain the same trick to overwrite the root password by the admin password ?
So a content like this
- Code: Select all
daemon telnetd {
script start = {
if [ ! -e /etc/shadow.telnet.backup ]; then
cp -dp /etc/shadow /etc/shadow.telnet.backup
cp -dp /usr/lib/python2.6/site-packages/unicorn/authentication/local/user.py /usr/lib/python2.6/site-packages/unicorn/authentication/local/user.py.telnet.backup
fi
cat /etc/shadow | while read line; do
username=`echo $line | awk 'BEGIN { FS = ":" } ; { print $1 }'`
password=`echo $line | awk 'BEGIN { FS = ":" } ; { print $2 }'`
#Escape hashed passwords '$' and '/' caracteres for use in sed
if [ ${username} == "root" ]; then escaped_root_password=`echo ${password} | sed -e s/\\\\$/\\\\\\\\$/g | sed -e s/\\\\//\\\\\\\\\\\\//g`
elif [ ${username} == "admin" ]; then escaped_admin_password=`echo ${password} | sed -e s/\\\\$/\\\\\\\\$/g | sed -e s/\\\\//\\\\\\\\\\\\//g`
fi
if [ -n "${escaped_admin_password}" ] && [ -n "${escaped_root_password}" ]; then
sed -i s/${escaped_root_password}/${escaped_admin_password}/g /etc/shadow
sed -i s/${escaped_root_password}/${escaped_admin_password}/g /usr/lib/python2.6/site-packages/unicorn/authentication/local/user.py
#debug ... echo "${escaped_root_password} ${escaped_admin_password} done" >> /etc/shadow.log
break
fi
done
/usr/sbin/telnetd 2>&1 >/dev/null &
}
}
Note: in your code you use "script start", should be "script daemon" like sshd.i ?