Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Microsoft EFS
From: "Dyke, Tim" <Tim.Dyke () worksafebc com>
Date: Tue, 11 Oct 2005 10:03:18 -0700

The DEFAULT recovery agent is the Administrator, on the other hand you
can to decrypt the data from the userX login like that userX; So crack
password or overwrite it off-line (the same for the delegated recovery


Tom wrote"
be careful:

overwriting the pw offline will work with efs on w2k.
it will not work with winxp/2003: you cant access any efs-data after 
resetting the password offline.

you'll have to crack the usesrs or the admins pw and either logon 
interactively or export their keys to get access to the efs-encrypted


Do you know how his will work for a machine that is part of a Domain?
Where there are no Local Users and the Default Recovery Agent is the
"Domain Admin"

I know tht one can always hack the local admin PW, then unjoin the
domain, but where does that leave the machine.
Is there any way to hack the "nounce" PW?



Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]