Full Disclosure mailing list archives
Microsoft EFS
From: "Dyke, Tim" <Tim.Dyke () worksafebc com>
Date: Tue, 11 Oct 2005 10:03:18 -0700
The DEFAULT recovery agent is the Administrator, on the other hand you
always
can to decrypt the data from the userX login like that userX; So crack
the
password or overwrite it off-line (the same for the delegated recovery
agent).
Tom wrote" be careful: overwriting the pw offline will work with efs on w2k. it will not work with winxp/2003: you cant access any efs-data after resetting the password offline. you'll have to crack the usesrs or the admins pw and either logon interactively or export their keys to get access to the efs-encrypted data. Tom" Do you know how his will work for a machine that is part of a Domain? Where there are no Local Users and the Default Recovery Agent is the "Domain Admin" I know tht one can always hack the local admin PW, then unjoin the domain, but where does that leave the machine. Is there any way to hack the "nounce" PW? Thanks Tim
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Microsoft EFS wilder_jeff Wilder (Oct 10)
- Re: Microsoft EFS Fco. Jose Garrido Matamoros (Oct 11)
- Re: Microsoft EFS Thomas Springer (Oct 11)
- Re: Microsoft EFS Fco. Jose Garrido Matamoros (Oct 11)
- Re: Microsoft EFS Mike Nice (Oct 11)
- Re: Microsoft EFS Thomas Springer (Oct 11)
- <Possible follow-ups>
- RE: Microsoft EFS Todd Towles (Oct 10)
- Microsoft EFS Dyke, Tim (Oct 11)
- Re: Microsoft EFS Fco. Jose Garrido Matamoros (Oct 12)
- Re: Microsoft EFS Fco. Jose Garrido Matamoros (Oct 13)
- Re: Microsoft EFS Thomas Springer (Oct 12)
- Re: Microsoft EFS Thomas Springer (Oct 12)
- Re: Microsoft EFS Fco. Jose Garrido Matamoros (Oct 12)
- Re: Microsoft EFS Fco. Jose Garrido Matamoros (Oct 11)
