华天P-660HNU-51怎用TTL线查密码
这东西还真不会玩,不知道接下来输入什么命令查询,超级终端显示:ADDRCONF(NETDEV_CHANGE): eth3.0: link becomes ready
eth3.0: add 33:33:ff:df:ac:84 mcast address to master interface
br0: port 3(eth3.0) entering learning state
br0: topology change detected, propagating
br0: port 3(eth3.0) entering forwarding state
eth3.0: add 33:33:ff:00:00:00 mcast address to master interface
Sending Query size
Error with sendmsg
Sending Query size
Error with sendmsg
Sending Query size
Error with sendmsg
ls
adsl gateway.conf passwd snmp
arl group ppp soft_bridge
default.cfg inetd.conf pppmsg sysmsg
default_lan.cfg init.d profile udhcpd.conf
dhcp inittab psk.txt udhcpd.leases
dhcp6c.conf.sampleiproute2 racoon.conf vlan
dhcp6s.conf.sampleipsec.conf radvd.conf.sample wlan
ethertypes ipv6_start.sample resolv.conf wrt54g.large.ico
filesystems modules_install samba wrt54g.small.ico
fstab mtab services
#
哪位大侠帮看看哦!!!!!学生谢过啦 用cat命令,查看conf文件。 查了所有的CONF都没,密码应该在PASSWD里面吧,不过肯定是加密了的 还有一种方法是不是可以把普通帐户提升至超级帐户权限呢?? 这是第一目录文件,怎样去查到密码呢?请大侠帮忙啦
# ls
bin e-data i-data mnt sbin usr
data etc lib opt sys var
dev home linuxrcproc tmp webs
下面的是ETC目录里的文件
cd etc
# ls
adsl gateway.conf passwd snmp
arl group ppp soft_bridge
default.cfg inetd.conf pppmsg sysmsg
default_lan.cfg init.d profile udhcpd.conf
dhcp inittab psk.txt udhcpd.leases
dhcp6c.conf.sampleiproute2 racoon.conf vlan
dhcp6s.conf.sampleipsec.conf radvd.conf.sample wlan
ethertypes ipv6_start.sample resolv.conf wrt54g.large.ico
filesystems modules_install samba wrt54g.small.ico
fstab mtab services
# 大侠出现吧!!!!怎个查到登入密码? qqyy123 发表于 2010-11-6 08:09 static/image/common/back.gif
大侠出现吧!!!!怎个查到登入密码?
ls /var 看看里面的东西 回复 MINE 的帖子
# cd var
# ls
bcmupnp.pid result
cache run
ct samba
dhcp6s.conf siproxd
dhcp6s_duid smd_messaging_server_addr
fuse state
fyi tmp
group udhcpd
hosts web_portal
hwaddr wl0
log wl0bands
mcpd.conf wl0cap
nvram wlver
passwd wpa_cap0
ppp zebra
#
进去查过所有的CONF,里面都没密码类的东西 查看一下ect目录下的default.cfg文件内容。