lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAA0BKn9uKnWEeCDU7Vx+IAQ8KAAAAQAAAAUaPKr3HkQEC+3JWK3pzVbwEAAAAA@online.gateway.expertworks.net>
From: aditya.deshmukh at online.gateway.expertworks.net (ALD, Aditya,
	Aditya Lalit Deshmukh)
Subject: [lists] Terminal Server vulnerabilities

 

>Of course, one of the very first things you should do on a Windows box 
>is rename the administrator account, so this kind of blind 
>brute-forcing is not possible.

There are ways to find out the usernames that are admin they begin with 500_
( do a Google search if you want )

Any script kiddy worth his salt will tell u this... So this one is off
because renaming admin account will only be security thru obscurity witch is
not good for the internet...


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ