Home page logo

basics logo Security Basics mailing list archives

Re[2]: Encryption on Laptops?
From: Alexander Lukyanenko <sashman () ua fm>
Date: Thu, 25 Mar 2004 23:49:59 +0200

Hash: SHA1

Hello Bart et al,
BLkc>    I simply change the
BLkc>  user account passwords on the box in question, log in as
BLkc> the user, and voila, I have the
BLkc>  files.
Nonsense! The idea of EFS is that the encryption keys (`certificates') are itself
encrypted with user's passwords. If you don't know the password,
you won't get to the files, and if you'll forcibly change the user's
password, you'll kill the certificate and render the encrypted files
But, the system can still be "opened".
You can boot with ERD/ntpasswd, change admin's password, boot
Windows as usual, login, run pwdump/lc4, get the password hashes and then
brute-force them using lc4 or John The Ripper (don't sure about the
later being able to deal with NTLM2 hashes). Then you login as the
user in question with his/her password and voila, you have the files.
It ain't as easy and fast (you need to bruteforce a password), as just
changing a user's password, but still possible.

* * * * * * * * * * * * * * *
* Alexander V. Lukyanenko   *
* ma1lt0: sashman ua fm     *
* ICQ#  : 86195208          *
* Phone : +380 44 458 07 23 *
* OpenPGP key ID: 75EC057C  *
* NIC   : SASH4-UANIC       *
* * * * * * * * * * * * * * *
Version: GnuPG v1.2.3 (MingW32)


Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]