Metasploit mailing list archives
Cached Domain Credentials
From: t.ellio.09 at gmail.com (Tommy Elliott)
Date: Thu, 9 Apr 2009 13:44:42 -0500
Awesome info thanks guys! Tommy On Thu, Apr 9, 2009 at 11:07 AM, Jerome Athias <jerome.athias at free.fr>wrote:
Test CacheDump http://www.derkeiler.com/Mailing-Lists/Securiteam/2005-05/0108.html Tommy Elliott a ?crit :Domain computers often cache credentials making it available to login with a domain username and password even when unhooked from the network. Where are the credentials being stored? I am also curious as to if there is already a program available that can crack cached domain credentials when unhooked from the network. Thanks in advance, Tumah
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090409/6a8db80d/attachment.htm>
Current thread:
- Cached Domain Credentials Tommy Elliott (Apr 09)
- Cached Domain Credentials Jerome Athias (Apr 09)
- Cached Domain Credentials rogue (Apr 09)
- Cached Domain Credentials wfdawson at bellsouth.net (Apr 09)
- Metasploit integration integration with commercial products, was Re: Cached Domain Credentials wfdawson at bellsouth.net (Apr 09)
- Metasploit integration integration with commercial products, was Re: Cached Domain Credentials Patrick Webster (Apr 15)
- Cached Domain Credentials rogue (Apr 09)
- Cached Domain Credentials Jerome Athias (Apr 09)
- Cached Domain Credentials Tommy Elliott (Apr 09)