lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <007101c6db68$7c11a250$e101a8c0@pcddyy2006> Date: Tue, 19 Sep 2006 00:21:58 +0300 From: "Wolf" <wolf.schiedler@...il.com> To: <full-disclosure@...ts.grok.org.uk> Cc: ge@...uxbox.org Subject: USB Attacks Going Commercial? Well if You have physical access to the computer its possible "on the fly" takeout copies of the SAM and system files with this tool: DiskInternals NTFS Reader 2.0 - Works XpSp2 - tested http://www.diskinternals.com/download/NTFS_Reader_Setup.zip So with this tool You dont need any "boot" or restarting of windows... I have tested it by having this tool in USB stick and taken copies out those files and then "breaked" the LMHashes with Rainbow crack or http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/index.php Regards - Wolf _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/