lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <418207CE.9030105@xillioncomputers.com>
From: nikon at xillioncomputers.com (Nick Eoannidis)
Subject: Re: Re: getting administrator rights on win2003 machine?

if u have physicall access to the box
grab the sam using linux nt password utility which spawns shells on tty3 
and 4
and allows you to mount ntfs partitions

so take the sam  then remove syskey (bkhive, bkreg, pwdump2)

then l0pht it with lc5

this is on the proviso you have PHYSICAL access to the box

if remotley id be footprinting to find an account with high rights then 
doing either brute force or privlege escalation

hope that helps a bit

nikon
Xillion Computers
"Trust your Technolust"
http://www.xillioncomputers.com
nikon@...lioncomputers.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5240 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041029/72abb301/smime.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ