If the grub menu is password protected (it might be), you need to boot using a linux live CD, mount the partition/hard drive that has the "/etc" directory (to find the device name that your "/etc" is located before booting off the live CD by changing directories to that location "cd /etc" and then running "df -k ./" and the device/filesystem should be listed as the first option, if the device is something like "/dev/mapper/blahblahblah", it is in a Linux Volume Management (LVM) filesystem and you need to do a few extra steps after booting off the live CD, run "vgchange -ay", which should activate the LVM and create the "/dev/mapper" devices to allow you to mount the "/dev/mapper/blahblah" device), and edit the "/etc/shadow" file and remove any characters between the first and second ":"'s in the file for the root username and your username (example "root:xGHsk$821jk&43jkhrwd$.:14302:0:99999:7:::" , change to"root::14302:0:99999:7:::"). You can then reboot the system like normal and then set the passwords for root and your username.
You have just learned how easy it is to break into a linux system as well...