lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040918140717.GB14272@eiv.com>
From: smcmahon at eiv.com (Shawn McMahon)
Subject: Re: Vulnerability in IBM Windows XP: default hidden Administrator account allows local Administrator access

On Fri, Sep 17, 2004 at 03:08:34PM -0500, Michael Wilson, Contractor said:
> 
> It is most likely the Vendor Install Customization that has caused this
> issue, as true enough, most vendor installs force you to pick an
> administrator password before using the system.  If the account is hidden,
> then it is definitely IBM's doing as I have never seen a Windows install
> where the administrator account could not be seen under the accounts tab.

Averatec laptop installs of XP Home have it hidden; you have to boot in
Safe Mode to add a password.

The documentation that specifies this is a Microsoft product, so I
suspect it's the same with other installs of Home, but I have only left
the packaged install of XP Home on one machine ever, so I am not at all
sure of this.


-- 
Shawn McMahon      | Let's set the record straight. There is no argument
EIV Consulting     | over the choice between peace and war, but there is
UNIX and Linux	   | only one guaranteed way you can have peace - and you
http://www.eiv.com | can have it in the next second - surrender. - Reagan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040918/a6b6bd05/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ