Penetration Testing mailing list archives

RE: Extracting NT password hashes from registry export file


From: "Stuart Flisher" <stuart.flisher () dalofte co ae>
Date: Thu, 1 Nov 2001 19:36:28 -0000

 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

One problem you have is even administrator doesn't have access to
the sam and security hives in the registry.
Only the system account has access to these.
As a result it is unlikely that the registry export contains these
hives.  

Going off at a slight tangent...

Doesn't running regedit or regedt32 from the AT command resolve
this?? It will open up the program a system user.

Dalofte Fz-LLC
Internet Security Consultants
Office 119, bldg 3
Dubai Internet City
P.O. Box 72395
Dubai
U.A.E.

stuart.flisher () dalofte co ae
(O) +971 4 391 1200
(M) +971 50 552 7817 


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBO+GkPLkq3S4xgD3VEQLQaQCeIuZFo895IXZMvC37rzMqXPUbpUkAn0S8
QZqH0QAy62UikAJe8QRZlCcf
=wzF6
-----END PGP SIGNATURE-----


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: