Home page logo
/

pen-test logo Penetration Testing mailing list archives

[PEN-TEST] Cracking a Stolen SAM
From: "Gallicchio, Florindo (2007)" <florindo.gallicchio () ESAVIO COM>
Date: Tue, 7 Nov 2000 14:25:59 -0500

Friends:

I'm currently performing a penetration test, and I was able to access the
SAM file located in the WINNT/repair directory.  Specifically, I exploited
the showcode.asp vulnerability to "see" the sam._ file in the \WINNT\repair
directory.  I screen-scraped the relevant contents to a Notepad file, and
saved it.

Here's where I began to guess.  First, I ran the file (I named it sam._)
through l0phtcrack and through the cracker on CyberCop, but it didn't take.
I then ran the file through the Windows "expand" command, and ran the
resulting file through the tools.  Still nothing.

Here's where I'm stuck.  I'm assuming that there are some funky control
characters in the screen-scrape file that I don't know about.  I tried some
traffic analysis work on the file, but I quickly got a headache.

Can anyone please help?  Thanks.

Florindo

________________________________________________
Florindo Gallicchio * Director, Security Services *
esävio * 15 Corporate Place South * 3rd Fl. *
Piscataway, NJ 08854 * 732.981.1991 x2007 *
florindo.gallicchio () esavio com
 * Adding Our Strength To Yours *


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]