lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <039c01c5ce81$f78e5350$331f060a@othello> Date: Tue Oct 11 18:29:44 2005 From: niceman at att.net (Mike Nice) Subject: Microsoft EFS If the system was set up with Syskey level 2 or 3, you'll not have much luck cracking the logon passwords either except by brute force. You'd need a brute force tool to try all passwords to expose the SAM data to precomputed password cracking tools. ----- Original Message ----- > you'll have to crack the usesrs or the admins pw and either logon > interactively or export their keys to get access to the efs-encrypted > data.