Skip to main content

Changing a forgotten root password on an ESX host

Note: In some cases a defective keyboard can cause problems logging into an ESX host. You might want to test with a different physical keyboard if you are having difficulties with known login credentials.
 
If you have forgotten or do not know the password for the root user on an ESX host, you may be able to change it without reinstalling. 
 
Warning: This can be used maliciously and should be safeguarded against through proper physical access to the host, authenticated remote console access, monitoring and protection against reboot procedures (e.g. grub password) and limited access to the management network.
 
For more information on security best practices, see http://www.vmware.com/resources/techresources/726.
 
Note: The procedure(s) below perform a password reset. This "blindly" replaces the existing root password with a new one. This is not a password recovery mechanism. That is, it does not allow you to learn the original root password. VMware does not provide tools or methods to recover the original root password of an ESX


1. Shutdown and Reboot your VMware ESX Server

If you don't know the VMware ESX Server root password, you don't know any passwords for root-equivalent accounts, and your virtual center server also does not have it cached, the only way to change the root user password is to first shutdown / power off your VMware ESX Server.

2. Press "a" to modify the kernel arguments

As soon as you see the GRUB boot screen, press "a" to modify the kernel arguments, like this:

3. Enter single user mode

At the end of the kernel arguments command line, type "single" and press Enter, like this:

4. Change the root password

Now, change the root password using the passwd command, like this:

You will need to enter the new root password twice.

5. Reboot the ESX Server

Once you have reset the root password, reboot the server to go back into multi-user mode.

6. Verify the new password

Once the system reboots, verify that the new root password works, like this:

In Summary

Resetting the VMware ESX Server root password is not difficult but you will have to bring down the server, enter single user mode, use the passwd command, and reboot to get the task completed.

Comments

Popular posts from this blog

How to enable SSH login access to a Cisco router

This guide walks you through how to setup SSH on a Cisco Router. SSH is by far more secure then telnet. Telnet allows your passwords to be sent in plain text that anyone can see and gain access to your network. SSH is all encrypted traffic. NOTE: This should work with any Cisco router provided the Cisco IOS on the router supports ssh. Firstly is ssh enabled? router#sh ip ssh SSH Disabled - version 2.0 %Please create RSA keys to enable SSH. Authentication timeout: 60 secs; Authentication retries: 5 In this case its not, if you got a error saying that sh ip ssh is not recognized then you would know that ssh is not supported or possibly that the command is different for your platform. How to enable SSH on a Cisco 800 series router# config term router(config)#crypto key generate rsa usage-keys label router-key The name for the keys will be: router-key Choose the size of the key modulus in the range of 360 to 2048 for your

INSTALL DOT NET FRAMEWORK ON MULTIPLE SERVERS USING POWERSHELL SCRIPT

Installing .Net 4.5.2 $servers = Array of Servers foreach($server in $servers) { Write-Host “Copying the installation file” copy-item  –path “-SOURCE” –destination “ destination ” Write-Host “Installing .NET 4.5.2” Invoke-Command –Computername $server –Credentials xxxx { C:\Temp\ NET 4.5.2  /passive /norestart }

Connection failed: enforce firewall policy failed (on win 7 / 64bit)

Connection failed: enforce firewall policy failed (on win 7 / 64bit)  error: connection failed: enforce firewall policy failed client: Check point endpoint security r75 build 835002205 on win 7 / 64 bit The solution is to find driver file vsdatant.sys and copy it to system32/drivers Ref :- https://forums.checkpoint.com/forums/thread.jspa?messageID=46927