Assume you don't have a local CD drive in the machine...
- create following floppies:
- RedHat netboot (CD1:RedHat/images/bootnet.img)
- RedHat drivers (CD1:RedHat/drivers.img)
- find a running RH71 system and copy tar,
rsh, /lib/libcrypt.so.1, and
/lib/libutil.so.1 to a floppy using cpio
(assuming you've collected the four files in some temp dir):
printf "tar\nrsh\nlibcrypt.so.1\nlibutil.so.1\n" | cpio -oc > /dev/fd0H1440
(what a crock.)
- mount the RedHat CD1 somewhere accessible to the machine being hacked.
- boot from the netboot floppy using:
- insert the drivers floppy when prompted
- supply so-called "rescue image" path on remote system, i.e., where
the CD is mounted. ("rescue image" means "netstg1.img" and
- configure your network interface and wait for shell prompt
- fdisk and mke2fs your hard disk
(if the disk had a bugus partition table that you had to nuke,
you probably will have to reboot to get it out of memory. In my
case, I got a message from "mke2fs" about not having enough
- don't forget to configure your swap partition with:
- mount a/the system partition on, let's say, "/goober"
- create special device for floppy using:
mknod /dev/fd0 b 2 0
- create the directory "/goober/x" and cd to it
- extract the cpio'd stuff using:
uncpio < /dev/fd0
- set LD_LIBARY_PATH:
- set path:
- configure rsh on system where CD is mounted such that
the user "root" on the system being repaired is allowed to
rsh to the remote system
- enter name of remote system in /etc/hosts for convenience:
echo "188.8.131.52 remote" > /etc/hosts
- cd to "/goober"
- restore from remote system:
rsh -l remote-user remote 'zcat /path/to/archive'|tar -xpf -
- edit things like "/etc/fstab" and "/etc/lilo.conf"
- run lilo to make disk bootable using:
lilo -r /goober -v
- you might want to disable some scripts in "/etc/rc.d/rc3.d"
- umount "/goober"
- press the RESET button
- select your favorite deity and pray!