Penetration Testing mailing list archives

RE: Visual Source Safe Crack


From: "Burkhard Sell" <sell () spektra de>
Date: Tue, 11 Jun 2002 12:22:45 +0200

Another way is creating a new sourcesafe database with a new admin
password.
Copy the um.dat file over the existing um.dat.
And you're able to login as admin with the new password.

Burkhard Sell

-----Original Message-----
From: Free, Bob [mailto:RWF4 () pge com] 
Sent: Wednesday, June 05, 2002 11:27 PM
To: 'krisk () kbeta com'; pen-test () securityfocus com
Subject: RE: Visual Source Safe Crack


Some code was posted in microsoft.public.visual.sourcesafe

Subject: VSS 6.0 Password recovery tool source Date: 2000-10-26 06:11:17
PST



-----Original Message-----
From: krisk () kbeta com [mailto:krisk () kbeta com]
Sent: Wednesday, June 05, 2002 1:43 PM
To: pen-test () securityfocus com
Subject: Visual Source Safe Crack


Anyone know if crack or any other tools will recover a forgotten admin
password for Visual Source Safe? I have some valid user accounts, and
all the data files, but the developers have forgotten the admin
password... Thanks!


------------------------------------------------------------------------
----
This list is provided by the SecurityFocus Security Intelligence Alert
(SIA) Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please
see: https://alerts.securityfocus.com/

------------------------------------------------------------------------
----
This list is provided by the SecurityFocus Security Intelligence Alert
(SIA) Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please
see: https://alerts.securityfocus.com/


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: