单用户模式、救援模式、克隆虚拟机和 Linux机器相互登录
2017-10-19 22:21
731 查看
单用户模式
单用户相当于windows 的安全模式
首先重启linux,常用的几个命令:
reboot init 6 shutdown -r now
关机命令:
init 0 poweroff
右键>电源>重新启动客户机
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6c62d48d93f501d92c870d94a8630b4a.jpg)
grub 界面,grub 是一个启动工具,找到系统的启动盘
按方向键选上面这个
按e进入编辑
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/ce64c65541da1fe1896011900a641b02.jpg)
找到linux16 这一行
找到ro(只读) 改成 rw(读写)再加 init=/sysroot/bin/sh
sysroot 是原系统所在的目录
ctrl+x
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/78e46acce6403187b44f0a7d669fa199.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/4111d71aad61a2fea27ad6ef2160c9cf.jpg)
此界面相当于进入了“安全模式”
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/51aaed7968b63b3f4a1334bb66fddf56.jpg)
可以查看一下ls /sysroot/boot/ls /sysroot/tmp/暂时是空的cat /sysroot/root/.ssh/authorized_keys
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/0bbcff969ce9f27332c060331347c264.jpg)
chroot /sysroot/
cat /root/.ssh/authorized_keys 这时候就可以使用原来系统的命令了
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6f018c0f0e7726fd36d4d7b7205edd34.jpg)
passwd root
发现乱码
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/acdd6427a7d2c9bd7ae00c0d416a700b.jpg)
ctrl +c 取消当前运行的命令
执行:lANG=en
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/5a19df79a2549c00f333b88c42e6d2ea.jpg)
再运行 passwd root
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/309c400616a8876a196afe96ee5bf42a.jpg)
更改后运行:
touch /.autorelabel
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6bd5fab183b7b5baca2f911d13227462.jpg)
之后电源>重新启动客户机
登录成功
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/33bb5b8e26591056ce2be33cca0f3e77.jpg)
如果忘记grup的密码,就要使用救援模式
运行级别 从0-6 总共7个级别
0:关机
1:单用户
2 3 4 :多用户模式
5:图形界面
6: reboot
ls -l /usr/lib/systemd/system/runlevel*target
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/89a6be770ba160d7ec606b979544b638.jpg)
先关机: init 0
再去编辑虚拟机
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/af40d7dac5507bdfba9e9710af8fd963.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/bfc1b4c28131e0624446234900f61049.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/af69fd623011266aece9da485d25a422.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/bd4154ee5e7972fdd2e3dafac8c81f09.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/e7447586949d0e50c39f933f20b977f9.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/9bb5ef996f9b81ac4fa6532e4ec62098.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/e99bf89510b8157deb6227ca59a2379b.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/c8e0b184df3afa8a00cbea22046db437.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/abbf44139fc610459e25173c2023bae4.jpg)
ls /mnt/sysimage/root/.ssh/authorized_keys
cat /mnt/sysimage/root/.ssh/authorized_keys
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/1b77e94b1067119ace0313f519b76e2a.jpg)
chroot /mnt/sysimagepasswd root
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/0bf4dd2db8c0aca6ac3beceba625cb27.jpg)
修改密码后,进入设置,
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/1ce7f30d3d25d39f8cbd99d4b761afad.jpg)
重启:
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/8d17ec716e8520d049cc6317f299b3e3.jpg)
登录测试
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/eca374c537c158f7b0d8b5204205b583.jpg)
登陆成功
克隆虚拟机
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/2ac1ed4665dcec42a088c41ca9c5d0f2.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/c6516381fdea551494e24e54bdaf8563.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/b402539f54a00e1197440a416fa77fec.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/0e63753e4b4f61019259acce3aea0465.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/4b6c6d89fef3e3ac15a6711b780c2c0b.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/f8b29bbe071eddaf52e31f6171045414.jpg)
登陆 serverlooker-02
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/9f7f554648bac5f3c6de13aa4bd39a29.jpg)
改一下 serverlooker-02的ip
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/c84f212934559106acd3be64cb871b14.jpg)
重新启动
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/346b1f612a1db8a5dae580f410a559f4.jpg)
测试外网,能ping 通
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/164886fbedd6f3fd588cd9920b6600c4.jpg)
改一下 aminglinux-02 的主机名:serverlooker-02
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/f520ed17019bed7dcda1b769d79c0cfe.jpg)
改一下aminglinux-01 的主机名: serverlooker-01
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/74dd74147d6d281373c083447798f8e9.jpg)
在xshell中添加 serverlooker-02
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/25d6bab1b2584c88225df9a9a7cbcfa5.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/19b8aed2cc0cd959440c17fb647832ff.jpg)
把 aminglinux-02 克隆一下,备用。
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6dbf1c28b1151bb383674c1aaed4b96b.jpg)
Linux机器相互登录
用w命令查看 连接 serverlooker-01的终端
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/9486c96e671cbfd64841f0d34630abe0.jpg)
用serverlooker-02 去连01
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/5d34afee89cda1defebfebf205ec9a6a.jpg)
查看当前登陆用户 whoami
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/82d11c5ad79ea69e5152f2b5284ca1bd.jpg)
通过指定端口连接:
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/2c27c9a6f9a8ae921e022a771d813ac6.jpg)
两个linux之间实现密钥认证
用02去连01
用工具:ssh-keygen 生成密钥对
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/be10537c24fa76f9825ac207a09dae31.jpg)
默认回车,生成密钥对
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/ca5daa8873b194a5215e45b4e7e85bd5.jpg)
把02的公钥内容复制到01
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/d5e00e5285a6605a08fbf9c3c676dbd3.jpg)
vi 写入
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/f30c339a111285739146edbc04121a44.jpg)
关闭 01的selinux
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/d2577c96fde12a3e69fdb5ebeb77de6b.jpg)
用02连01,不用输入密码。
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/d37240654878b8b22abb6e0a53b1d327.jpg)
连接成功。
单用户相当于windows 的安全模式
首先重启linux,常用的几个命令:
reboot init 6 shutdown -r now
关机命令:
init 0 poweroff
右键>电源>重新启动客户机
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6c62d48d93f501d92c870d94a8630b4a.jpg)
grub 界面,grub 是一个启动工具,找到系统的启动盘
按方向键选上面这个
按e进入编辑
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/ce64c65541da1fe1896011900a641b02.jpg)
找到linux16 这一行
找到ro(只读) 改成 rw(读写)再加 init=/sysroot/bin/sh
sysroot 是原系统所在的目录
ctrl+x
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/78e46acce6403187b44f0a7d669fa199.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/4111d71aad61a2fea27ad6ef2160c9cf.jpg)
此界面相当于进入了“安全模式”
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/51aaed7968b63b3f4a1334bb66fddf56.jpg)
可以查看一下ls /sysroot/boot/ls /sysroot/tmp/暂时是空的cat /sysroot/root/.ssh/authorized_keys
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/0bbcff969ce9f27332c060331347c264.jpg)
chroot /sysroot/
cat /root/.ssh/authorized_keys 这时候就可以使用原来系统的命令了
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6f018c0f0e7726fd36d4d7b7205edd34.jpg)
passwd root
发现乱码
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/acdd6427a7d2c9bd7ae00c0d416a700b.jpg)
ctrl +c 取消当前运行的命令
执行:lANG=en
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/5a19df79a2549c00f333b88c42e6d2ea.jpg)
再运行 passwd root
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/309c400616a8876a196afe96ee5bf42a.jpg)
更改后运行:
touch /.autorelabel
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6bd5fab183b7b5baca2f911d13227462.jpg)
之后电源>重新启动客户机
登录成功
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/33bb5b8e26591056ce2be33cca0f3e77.jpg)
如果忘记grup的密码,就要使用救援模式
运行级别 从0-6 总共7个级别
0:关机
1:单用户
2 3 4 :多用户模式
5:图形界面
6: reboot
ls -l /usr/lib/systemd/system/runlevel*target
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/89a6be770ba160d7ec606b979544b638.jpg)
先关机: init 0
再去编辑虚拟机
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/af40d7dac5507bdfba9e9710af8fd963.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/bfc1b4c28131e0624446234900f61049.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/af69fd623011266aece9da485d25a422.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/bd4154ee5e7972fdd2e3dafac8c81f09.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/e7447586949d0e50c39f933f20b977f9.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/9bb5ef996f9b81ac4fa6532e4ec62098.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/e99bf89510b8157deb6227ca59a2379b.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/c8e0b184df3afa8a00cbea22046db437.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/abbf44139fc610459e25173c2023bae4.jpg)
ls /mnt/sysimage/root/.ssh/authorized_keys
cat /mnt/sysimage/root/.ssh/authorized_keys
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/1b77e94b1067119ace0313f519b76e2a.jpg)
chroot /mnt/sysimagepasswd root
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/0bf4dd2db8c0aca6ac3beceba625cb27.jpg)
修改密码后,进入设置,
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/1ce7f30d3d25d39f8cbd99d4b761afad.jpg)
重启:
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/8d17ec716e8520d049cc6317f299b3e3.jpg)
登录测试
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/eca374c537c158f7b0d8b5204205b583.jpg)
登陆成功
克隆虚拟机
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/2ac1ed4665dcec42a088c41ca9c5d0f2.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/c6516381fdea551494e24e54bdaf8563.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/b402539f54a00e1197440a416fa77fec.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/0e63753e4b4f61019259acce3aea0465.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/4b6c6d89fef3e3ac15a6711b780c2c0b.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/f8b29bbe071eddaf52e31f6171045414.jpg)
登陆 serverlooker-02
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/9f7f554648bac5f3c6de13aa4bd39a29.jpg)
改一下 serverlooker-02的ip
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/c84f212934559106acd3be64cb871b14.jpg)
重新启动
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/346b1f612a1db8a5dae580f410a559f4.jpg)
测试外网,能ping 通
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/164886fbedd6f3fd588cd9920b6600c4.jpg)
改一下 aminglinux-02 的主机名:serverlooker-02
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/f520ed17019bed7dcda1b769d79c0cfe.jpg)
改一下aminglinux-01 的主机名: serverlooker-01
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/74dd74147d6d281373c083447798f8e9.jpg)
在xshell中添加 serverlooker-02
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/25d6bab1b2584c88225df9a9a7cbcfa5.jpg)
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/19b8aed2cc0cd959440c17fb647832ff.jpg)
把 aminglinux-02 克隆一下,备用。
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/6dbf1c28b1151bb383674c1aaed4b96b.jpg)
Linux机器相互登录
用w命令查看 连接 serverlooker-01的终端
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/9486c96e671cbfd64841f0d34630abe0.jpg)
用serverlooker-02 去连01
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/5d34afee89cda1defebfebf205ec9a6a.jpg)
查看当前登陆用户 whoami
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/82d11c5ad79ea69e5152f2b5284ca1bd.jpg)
通过指定端口连接:
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/2c27c9a6f9a8ae921e022a771d813ac6.jpg)
两个linux之间实现密钥认证
用02去连01
用工具:ssh-keygen 生成密钥对
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/be10537c24fa76f9825ac207a09dae31.jpg)
默认回车,生成密钥对
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/ca5daa8873b194a5215e45b4e7e85bd5.jpg)
把02的公钥内容复制到01
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/d5e00e5285a6605a08fbf9c3c676dbd3.jpg)
vi 写入
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/f30c339a111285739146edbc04121a44.jpg)
关闭 01的selinux
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/d2577c96fde12a3e69fdb5ebeb77de6b.jpg)
用02连01,不用输入密码。
![](https://oscdn.geek-share.com/Uploads/Images/Content/202003/30/d37240654878b8b22abb6e0a53b1d327.jpg)
连接成功。
相关文章推荐
- Linux的单用户模式、救援模式、克隆虚拟机、机器相互登录
- 1.13 单用户模式 1.14 救援模式 1.15 克隆虚拟机 1.16 Linux机器相互登录
- 1.13 单用户模式&1.14 救援模式&1.15 克隆虚拟机&1.16 Linux机器相互登录
- 1.13 单用户模式 1.14 救援模式 1.15 克隆虚拟机 1.16 Linux机器相互登录
- 单用户、救援模式、克隆虚拟机、Linux机器相互登录
- 一周第四次课 2017.10.19 单用户模式、救援模式、克隆虚拟机、Linux机器相互登录
- 单用户模式 救援模式 克隆虚拟机 Linux 机器相互登录
- 单用户模式/救援模式/克隆虚拟机/Linux机器相互登录
- 单用户模式 ,救援模式 ,克隆虚拟机 , Linux机器相互登录
- 1.13 单用户模式 1.14 救援模式 1.15 克隆虚拟机 1.16 Linux机器相互登录
- 单用户模式&救援模式&克隆虚拟机&Linux机器相互登录
- 1.13 单用户模式 1.14 救援模式 1.15 克隆虚拟机 1.16 Linux机器相互登录
- 单用户模式&救援模式&克隆虚拟机&Linux机器相互登录
- 单用户模式、救援模式、克隆虚拟机、Linux机器相互登录
- 1.13 单用户模式;1.14 救援模式;1.15 克隆虚拟机;1.16 Linux机器相互登录
- 单用户模式、救援模式、克隆虚拟机、linux机器相互登录
- 单用户模式 救援模式 克隆虚拟机 Linux机器相互登录
- 单用户模式、救援模式、克隆虚拟机、linux机器相互登录
- 一周第四次课(3月22日)1.13 单用户模式 1.14 救援模式 1.15 克隆虚拟机 1.16 Linux机器相互登录
- 单用户模式、救援模式、克隆虚拟机、Linux机器相互登录