Glen: try a meaningful subject line.
\r\n\r\n[link|http://z.iwethey.org/forums/render/content/show?contentid=100252|As I said] the last time someone asked this question, this is a FAQ, you can Google the answer readily, and the question is answered, under the subject "root password recovery", here. Short answer: boot single, or with a shell as your init.
\r\n\r\nAnswering the other part of your question, as Rick suggests, performing forensics from a potentially compromised system is a rather charming exercise in misplaced trust. I'd strongly recommend keeping a bootable disk (viz: Knoppix, lnx-bbc) around for just this purpose, though a known-good sash shell may be useful. Simply changing your passwords won't do much good if the hole's still there.
\r\n\r\nDebian does provide a tool to look for rootkit residues, called chkrootkit. I'd recommend installing it and running it daily or better.
\r\n\r\nRick can probably give (or point to) better resources on post-crack (or suspected hack) cleanup. I thought there was a HOWTO/Mini-HOWTO on the topic but cannot find one presently (searches are slow over a currently slammed 56k dialup). I can, however, think of [link|http://twiki.iwethey.org/|a good place to put info]. Installing from known good backups, or reinstalling all packages (and wiping any odd binaries) is strongly recommended. I'm currently doing (among other things) a reinstall of packages to ensure that any cruftiness left over from an unintentional wipe of my root partition is cleaned up. Under Debian: apt-get install -du --reinstall $( dpkg -S /etc ) is a first-pass approximation. Some incompatibilities and deadlocks force an incremental approach.
\r\n