Penetration Testing mailing list archives

Novell NDS


From: "s c" <nogodhere () hotmail com>
Date: Wed, 11 Dec 2002 12:10:53 +0000




Interestingly Novell has provided new patches for thei NDS, which when applied now create different file types after running a DSREPAIR.

In the past and without the upgrade, once you have RCONSOLE access you can then create a backup of the NDS with DSREPAIR and then use a product like Pandora (NMRC) to break the .DIB file apart and crack the passwords with it. Another password cracker for Novell's NDS is IMP.

Unfortunately, the file type is now in a file named '00000000.$DU'.

Just like I don't know the actual coding to break apart the SAM that l0phtcrack uses, I don't know the actual coding to do the same to the NDS files.

I believe this new file is actually signed by a private key generated by the Novell system, making it more difficult to crack.

Any advice here would be helpful. The penetration activity is still successful as we have ADMIN level access and created our own account and can view any system, reset any password, etc. It would be helpful to be able to crack all the passwords for the client as well as for our own enjoyment.

-P

_________________________________________________________________
The new MSN 8: advanced junk mail protection and 2 months FREE* http://join.msn.com/?page=features/junkmail


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: