my problem is like this:
I was tasked to recover the contents of an old caldera openunix 5.0 machine running informix.
I have no root password, and the machine immediately boots on a terminal application once powered on (in short, there's no username/passwd prompt, bootup goes straight to the terminal app)
I cannot mount the filesystem using another linux disk(ubuntu), first maybe because the filesystem is not recognized (HTFS?) and maybe because it is on hardware raid 5.
The real objective is exporting the contents of the database in a csv or plaintext file. A windows application logs into this database doing informix queries, but I do not have the source. Theoretically, I can packet-cap the requests being made to the server if these are not encrypted. Maybe based on this application, you can create a set of queries that will export even only the essential part of the database (which is yet to be determined. You can determine first if this is a possible solution.)
Another possible solution is to crack the root account. Since this is an old openunix installation, this is a possibility but I have already looked into it and felt hopeless. I did nmap and searched securityfocus for public exploits and returned only a few results, all of which failed.
I only need step-by-step instructions, walkthrough, and guide until I am able to extract the required contents from the machine. No, this is not an illegal attempt, but sometimes employees leave a company without a word and too bad this is one of those cases, where the admin took the password with him.
Please post your bids. Kindly ask questions if you find my explanation above difficult to understand.