lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200410281722.i9SHMfxF004892@turing-police.cc.vt.edu>
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Re: getting administrator rights on win2003 machine? 

On Thu, 28 Oct 2004 16:49:44 +0200, Honza Vlach said:
> 
> --9Ek0hoCL9XbhcSqy
> Content-Type: text/plain; charset=iso-8859-2
> Content-Disposition: inline
> Content-Transfer-Encoding: quoted-printable
> 
> > use knoppix to boot from, mount the ntfs filesystem, and search the net for
> > which keys in registry you have to change. there may be other files too that
> > you have to change
> > there even are special bootcd's that are made only for the purpose of changing
> > the admin pass etc...
> 
> I thought that real blackhats don't teach lamers who can't even do their
> homework properly =^)

The part that nobody's going to tell him:

1) It's *easy* to whomp a server with a Knoppix boot if you have physical access.

2) It's *HARD* to do so without anybody noticing that the server is down and
you're sitting there in front of it, typing away as fast as you can. And even
the most midget-brained user can figure out that if the server is down, and
you're still typing, and you're *not* the sysadmin, you probably have something
to do with why it's down...

:)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041028/a68748b9/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ