Metasploit mailing list archives
Cached Domain Credentials
From: wullie19 at ntlworld.com (rogue)
Date: Thu, 9 Apr 2009 19:43:55 +0100
Cane & abel www.oxid.it/cain.htm -rogue
Test CacheDump http://www.derkeiler.com/Mailing-Lists/Securiteam/2005-05/0108.html Tommy Elliott a ?crit :Domain computers often cache credentials making it available to login with a domain username and password even when unhooked from the network. Where are the credentials being stored? I am also curious as to if there is already a program available that can crack cached domain credentials when unhooked from the network. Thanks in advance, Tumah_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Cached Domain Credentials Tommy Elliott (Apr 09)
- Cached Domain Credentials Jerome Athias (Apr 09)
- Cached Domain Credentials rogue (Apr 09)
- Cached Domain Credentials wfdawson at bellsouth.net (Apr 09)
- Metasploit integration integration with commercial products, was Re: Cached Domain Credentials wfdawson at bellsouth.net (Apr 09)
- Metasploit integration integration with commercial products, was Re: Cached Domain Credentials Patrick Webster (Apr 15)
- Cached Domain Credentials rogue (Apr 09)
- Cached Domain Credentials Jerome Athias (Apr 09)
- Cached Domain Credentials Tommy Elliott (Apr 09)