Penetration Testing mailing list archives

Re: forgotten admin password


From: "Hans-J. Ullrich" <hans.ullrich () loop de>
Date: Fri, 20 Apr 2007 12:00:39 +0200

Am Freitag, 20. April 2007 05:40 schrieb cesar montano:
 mates,
   need your inputs badly.  we have w2k3 server with
 a newly installed application ...  unfortunately, the
 system staff who's in-charge for that server has
 forgotten the admin password he inputted in the last
 few weeks.  any idea on how to recover it  or other
 way to login on that server?


 advance thanks to everyone.

Hello !

just take a look at peter nordahls rescue cd. It will overwrite the password.
You will find it here:

http://home.eunet.no/pnordahl/ntpasswd/

It is tested with Win98, Win2000, Win2003 and WinXP.
As I do not have Windows Vista (and probably will never have cause I am using 
Linux), I do not know, if it works with Vista.

Anyway, make a disk, boot from it and well, it is all self explaining.

Good luck !

Hans-J. Ullrich




__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam
protection around
http://mail.yahoo.com

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around
http://mail.yahoo.com

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------

-- 
Firma
Ullrich-IT-Consult
Inh.: Hans-J. Ullrich
Münstedter Weg 10
31246 Oberg
www: http://www.ullrich-it.de

Linux-Beratung für Server und Clients 
IT-Sicherheit, Linux-Schulungen und Workshops 
  

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------


Current thread: