NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [FW1] Administrator's password has been discovered by non-priviledged user !



My reference to "script kiddies" only meant none of the the hacks I was
recommending were all that complicated to pull off.


Carric Dooley CNE
COM2:Interactive Media
http://www.com2usa.com


"But this one goes to eleven."
-- Nigel Tufnel


On Sat, 2 Sep 2000, Mail @ faithinchaos.com wrote:

> If you are using switches, perhaps they are high-end enough to allow
> port-mirroring.  That way you can sniff/monitor specific port traffic.
> 
> Your script kiddie reference bothers me.  Script kiddies are those that do
> not understand what they are doing and are simply using scripts or
> precompiled programs that will give them a specific end-result.
> 
> To say that method ITSELF is "none too clever" is a very bogus statement -
> and is usually the result of a legitimate admin's work.
> 
> -----Original Message-----
> From: [email protected]
> [mailto:[email protected]]On Behalf Of Carric Dooley
> Sent: Monday, August 28, 2000 11:07 AM
> To: BY
> Cc: NT 2000 Discussions; [email protected];
> [email protected]
> Subject: Re: [FW1] Administrator's password has been discovered by
> non-priviledged user !
> 
> 
> Hmmm.. a bunch of ways to do it;
> 
> 1.  boot up on a floppy running ntfsdos driver, copy over sam_ and crack
> it with l0pht (if you bother to use NTFS... you can skip ntfsdos if you
> use FAT).
> 
> 2.  Use linux boot disk
> 
> 3.  boot up off floppy and overwrite SAM_ with a default copy with no
> password for admin.
> 
> 4.  use l0pht's smbsniffer to pull the hashes off the wire (if you are not
> useing switches) and then crack that.
> 
> etc., etc.
> 
> This is just a few of the methods (and some of the more "script kidddy"
> methods aswell.. none of it is too clever) to bypass MS models.
> 
> 
> Carric Dooley CNE
> COM2:Interactive Media
> http://www.com2usa.com
> 
> 
> "But this one goes to eleven."
> -- Nigel Tufnel
> 
> 
> On Sat, 26 Aug 2000, BY wrote:
> 
> >
> > Hi there,
> >
> > I find this is really very annoying. The user with only a common domain
> user
> > priviledge who has no even power user priviledged. How does he find out
> the
> > local administrator's and even the domain account administrator's password
> ?
> > I just hope he is lying to us. Cant really tell with his cheaky face
> though.
> >
> > I am surprised that there is a hacking tool that can explore anyone's
> > password with just a common domain user's priviledge account ? Can
> somebody
> > what would the possible hacking tools he is using ?
> >
> > A Big Thank You !
> >
> > BY
> >
> >
> >
> >
> ============================================================================
> ====
> >      To unsubscribe from this mailing list, please see the instructions at
> >                http://www.checkpoint.com/services/mailing.html
> >
> ============================================================================
> ====
> >
> 
> -
> [To unsubscribe, send mail to [email protected] with
> "unsubscribe firewalls" in the body of the message.]
> 



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents � 2003 Network Presence, LLC. All rights reserved.