[oclug] Win Passwords cracked in 14 seconds
howardk at zed.net
Thu Jul 24 00:35:37 EDT 2003
Read my answer to a previous post -- the reason for the utility was
where the system administrator quit and the owner of the business
needed to get into the root of the server. The idea was to be able to
make the needed changes without disrupting the business or
compromising his business data. And, DUH -
the idea was to be able to do a clean bit of maintenance, not an
Wednesday, July 23, 2003, 9:53:45 PM, you wrote:
DW> DUH! If you can boot a PC from a CD or floppy then there are many ways to
DW> crack it.
DW> The study materials for the CISSP mentioned the risk sniffing a Windows NT
DW> password. Probably you could send it a message and get it to return the
DW> password hash. Then take it home. At places like Algonquin and Carleton U.
DW> people regularly plug their laptops into the LAN...................
DW> On Wednesday 23 July 2003 18:13, Howard Krakower wrote:
>> Incidently, there is a bootable floppy that will allow you to change
>> the root (er, Administrator) password on any NT, Win2K or WinXP box.
>> It actually boots up in linux and has a neat text type of menu.
>> Wednesday, July 23, 2003, 2:22:31 PM, you wrote:
>> RG> Albert Cardarelli said:
>> >> You'll love this one:
>> >> http://zdnet.com.com/2100-1105_2-5053063.html
>> RG> Oh, I love it. A few years ago, I found out a way to cause an NT 4.0
>> RG> domain server to crash. Not so difficult. But in this instance, it
>> would RG> create a domain admin account with full rights as it crashed. I
>> think RG> this was fixed in SP 4.0, some 2 1/2 years later.
>> RG> However, any respect I would have had for Luca Wullschleger and Claude
>> RG> Hochreutiner went out the window as soon as I checked the site
>> mentioned RG> in the story. That has got to be one of the most
>> irresponsible security RG> responses I've ever seen
>> RG> Rod.
visit us at http://www.zed.net
More information about the OCLUG