-
October 20th, 2004, 01:26 PM
#21
Originally posted here by MsMittens
After a little experimentation and a bit of research I've discovered the following (feel rather silly as I probably should know this.. but anyways):
Windows XP Professional: since this was designed for corporate environments, the option to boot into safe-mode and thus be the administrator won't work. You'll need to know the password of the administrative account(s)
That explains why I couldn't get into safe mode!
Steve
IT, e-commerce, Retail, Programme & Project Management, EPoS, Supply Chain and Logistic Services. Yorkshire. http://www.bigi.uk.com
-
October 20th, 2004, 02:22 PM
#22
Junior Member
Originally posted here by MsMittens
Uh... what's the question? Generally if you are creating a new password you need the old password, unless you are using one of the "tools" that can by-pass this. Hrmmm.. have you clicked on the link I provided and seen what it does? Experiment with it on a "dumdum machine" (that is a machine you can scarifice in case of... "Ooops!" situations)
Byt the output it looks very much like EBCD. At least it does the same. Most seem to be working in about the same way and same or similar menus.
NTPassword works on a boot diskette and gives you the option to reset pwd or to change/replace the pwd (NT Hash value) for certain user (built in and non built in accounts).
Uh.. do you mean ERD rather than EFS? Or is there something you are referring to that you've read somewhere else? If you mean the ERD I was referring to whereby it copies the SAM to the Repair directory (much like rdisk /s did in the NT days), then yes you could grab it and then use a tool like L0phtCrack (aka LC5 and now $$$$$$$). Other tools to consider include Cain'n'Abel and/or SamInside. Now as admins we aren't doing this for malicious reasons but rather to test our users' password strength, right?
No, I mean Encrypted File System (EFS). Read + viewed demo movies + tested myself
Since replacing or resetting a pwd on a system with EFS wont let you access any of the files you need to crack the original pwd. So you copy the SAM and the SECURITY files and crack the pwd with, say L0phtCrack. Especially easy if LM Hash is enabled.
Thx for some clarifications
Btw. I'm too old to like destroying others properties by hacking for evil intentions. I do, though, LOVE making it tough for hackers and wannabe hackers to access my domain/comps.
Lost passwords is a common thing among normal users, even when they use easy pwds.
.·´¯`·-·´¯`wayuu´¯`·-·´¯`·.
\'To attain knowledge add something every day....
....to attain wisdom remove something every day.\'
-
October 20th, 2004, 02:33 PM
#23
Junior Member
Forgot.
There is also this preventive measure I found on MS site:
http://support.microsoft.com/kb/305478
Too late for Steve though.
.·´¯`·-·´¯`wayuu´¯`·-·´¯`·.
\'To attain knowledge add something every day....
....to attain wisdom remove something every day.\'
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|