Security Basics mailing list archives

Re: Windows 2000 Administrator lockout


From: fiber <mynameisfiber () gmail com>
Date: Thu, 19 Aug 2004 17:35:28 +0200

you can also boot up with knoppix-std (google for the site) and access
the SAM file (windows NT's password file) and use john the ripper
(which is also on this boot CD) to crack it.  it might take some time
but it works

i recommend you become familiar with knoppix-std or any other form of
bootable linux, they have saved my life before and many computers.  it
is very powerful and can be used for basically anything security wise.

hope this helps!

-fiber

On Tue, 17 Aug 2004 10:40:12 -0300, Bruno Guedes Souto
<brunoguedes () gmail com> wrote:
You can use audition programs like @stake LC4 or 5 (the old
l0pthcrack). Since you are using symantec virus manager I assume it's
a windows box, then you will need the SAM file of the station you
wanna crack. To get the SAM file content you can use a program called
pwdump2. Of course you will have to run the LC in a machine that you
have admin rights.

Bruno G. Souto




On Fri, 13 Aug 2004 11:54:53 -0700, Robert Ritchey <rritchey () eods com> wrote:
Hello All,

The network that I have is rather small.  1 server, and 4 workstations.
I inherited the systems.  There has been no administrator working there
for a little over a year.  What administrator that was there, was very
much non-technical.

When the network was built whoever built the server installed everything
they possibly could.  This system now how few main functions:
1. File server
2. Internet Gateway
3. Symantec Virus manager

Nobody knows any of the passwords for anything on the system.  Any of
the passwords that are in use are not allowed administrator access.  I
do mean for anything!  I can't even get Symantec to update virus
signatures, as I do not have a password to do the update with.  The
signature is like 2003 date.

It is just very frustrating!

I am looking for options, before I have to go and reformat and rebuild.
This would in some ways make life simpler, there are wrinkles in that
all of there operational data and other services are on the server.  We
are currently moving foreword with a plan to rebuild.  This will happen;
I would rather pick the time to do it.  Rather than have it forced on
me.

Does anyone know of any other way to take control of this machine and
network.

Thanks for your time and any ideas will be appreciated.

Robert Ritchey

---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------



---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.securityfocus.com/sponsor/InfoSecInstitute_security-basics_040817
----------------------------------------------------------------------------


Current thread: