Penetration Testing mailing list archives

Re: NT Password Recovery Bootable CD


From: "William Salusky" <change () dmzs com>
Date: Mon, 12 Nov 2001 15:20:59 -0000

I haven't had the opportunity to try it yet, but the very same disk should 
allow you to mount the NTFS or FAT32 filesystem navigate to the repair 
directory and dd the file off the machine, or copy to floppy.

Just Alt-F# to a virtual console and do it manually.

I'll try it myself shortly to verify that my idea is not crocked.

William


Damieon Stark <visigoth () securitycentric com> said:

Greetings all,

      Anybody happen to have a bootable tool like this which is capapble of
recovering a copy of the sam._ file?  In many instances (of pen-testing) it
would be _more_ useful to be able to recover the passwords un-damaged.  Any
ideas?

Cheers,
-visigoth

-- 

Damieon Stark, CCSE,CCNA
Unix/Network Security Engineer


______________________________________________________________________________
      Damieon Stark           | Microsoft: Where do you want to go today?
e: visigoth () securitycentric com    | Linux: Where do you want to go 
tommorow?
      p: 612.382.6945         | FreeBSD/Sun: Are you guys coming or what?
      pgp: 0xBE5D0C57         | http://www.sun.com/solaris - To the Nth!
      pgp.mit.edu             | http://www.freebsd.org - The power to serve!
----------------------------------------------------------------------------
--
I'll see your DMCA and raise you a First Amendment.
http://www.anti-dmca.org
----------------------------------------------------------------------------
--
eot




-- 
William Salusky
Manager: Security Services
DMZ Services
change () dmzs com
cell: 925-250-6092




----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: