Archive for the ‘ Hackings ’ Category

Solving libtool error on Gentoo

First post in english , why?

  • This is an international issue,  a “bug” during the Gentoo update process;
  • I want to be found by Google searches.

Everything begins with a not good idea, trying to update my Gentoo box. A simple task, except for broken dependencies errors generated due the change of some libraries versions and 2 days of compilation+errors. 😛

After running emerge -ap –newuse –deep –update world, all is need to do is sit and wait. Just in theory haha.

Things was getting annoying when some ebuilds were complaing about .la files that has been removed from the system (libtool: link: `xxx/xxx/archive.la’ is not a valid libtool archive), even the use of revdep-rebuild couldn’t fix the problem, I have to use –skipfirst parameter to delay errors while searching for a solution. According to the gentoo-devs and this bug report (with a funny discution. See the number of duplicated bugs too), it’s ok if some .la files are deleted finishing with a broken system…

What’s not well reported at all, is that a simple package could fix it (also can be found in previous bug report link), lafilefixer. To repair, just run the following commands:

1. To install package
# emerge lafilefixer

2. Running and fixing broken libraries
# lafilefixer –justfixit

After that, things were fine =)

Anúncios

Hackear o Windows

Opa! Mais um post-hacking no Blog.
A instrução é para apagar a senha de qualquer usuario do Windows através do Linux.

Para as operações abaixo, foi utilizado um LiveCD do Linux Mint:
1. Assim que o sistema for inciado, deve-se instalar um aplicativo que irá trabalhar com os arquivos de registro do Windows, chamado CHNTPW (http://pogostick.net/~pnh/ntpasswd). Para o caso das distibuições Debian-like, o comando apt-get faz o serviço:

apt-get install chntpw

3. Com o CHNTPW instalado, monta-se a particao do Windows em algum lugar, geralmente na pasta /mnt. Outra coisa é observar a partição que o windows estará instalado (sendo ele o unico S.O. instalado, estará em sda1), além do sistema de arquivos utilizado, que nas versões mais recentes tem sido a NTFS:

mkdir /mnt/windows
mount -t ntfs /dev/sda1 /mnt/windows

4. Acesse a partição do Windows e caminhe ate o diretório onde ficam localizados os arquivos SAM: ‘systemroot/Windows/System32/config’:

cd /mnt/windows/Windows/System32/config

5. A seguir, chega o momento de resetar a senha de determinado usuario, utilizando o CHNTPW:

chntpw -u USERNAME SAMFILE

6. Aparecerá este menu, com algumas opções. Escolha aquela que lhe for conveniente:

– – – – User Edit Menu:
1 – Clear (blank) user password
2 – Edit (set new) user password (careful with this on XP or Vista)
3 – Promote user (make user an administrator)
4 – Unlock and enable user account [probably locked now]
q – Quit editing user, back to user select

7. Para apagar a senha, basta teclar 1 e confirmar. Depois é só reiniciar a máquina e sorrir =D

Anúncios