Penetration Testing mailing list archives

cracking Y2k DC Admin password


From: "Steve Armstrong" <stevearmstrong () logicallysecure com>
Date: Mon, 25 Sep 2006 22:44:48 +0100

Juan

It is rather worrying that you are being paid to conduct a pen test but
cannot even dump the sam from a 2k box, as I would condiser this a basic
pen testing  skill.

That aside, look at fizzgigs post some 10minutes before  yours.  Get
their improved version of pwdump6, rtfm and 'crack on'.  

SteveA



-----Original Message-----
From: "juanbabi () yahoo com" <juanbabi () yahoo com>
To: "pen-test () securityfocus com" <pen-test () securityfocus com>
Sent: 23/09/06 16:06
Subject: cracking Y2k DC Admin password

Hi,


for a pen test in doing I got control on the server and logged as the
local admin. know I need to retrive the admin's password this is the
goal of the pen test from the client side. I know an easy way to crack
the sam file with a live linux cd but I cant boot the server it needs to
be allways up. I tried to use pwdump.exe but it tells me he cand find
the local ADMIN$ shere. so it wont work.does someone knows a good way to
retrive and crack the admin's password.I an really stuck on this...


thanks very much !

Juan

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=7016
00000008bOW
------------------------------------------------------------------------



------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------


Current thread: