[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [FW1] Administrator's password has been discovered by non-priviledged user !
My reference to "script kiddies" only meant none of the the hacks I was recommending were all that complicated to pull off. Carric Dooley CNE COM2:Interactive Media http://www.com2usa.com "But this one goes to eleven." -- Nigel Tufnel On Sat, 2 Sep 2000, Mail @ faithinchaos.com wrote: > If you are using switches, perhaps they are high-end enough to allow > port-mirroring. That way you can sniff/monitor specific port traffic. > > Your script kiddie reference bothers me. Script kiddies are those that do > not understand what they are doing and are simply using scripts or > precompiled programs that will give them a specific end-result. > > To say that method ITSELF is "none too clever" is a very bogus statement - > and is usually the result of a legitimate admin's work. > > -----Original Message----- > From: [email protected] > [mailto:[email protected]]On Behalf Of Carric Dooley > Sent: Monday, August 28, 2000 11:07 AM > To: BY > Cc: NT 2000 Discussions; [email protected]; > [email protected] > Subject: Re: [FW1] Administrator's password has been discovered by > non-priviledged user ! > > > Hmmm.. a bunch of ways to do it; > > 1. boot up on a floppy running ntfsdos driver, copy over sam_ and crack > it with l0pht (if you bother to use NTFS... you can skip ntfsdos if you > use FAT). > > 2. Use linux boot disk > > 3. boot up off floppy and overwrite SAM_ with a default copy with no > password for admin. > > 4. use l0pht's smbsniffer to pull the hashes off the wire (if you are not > useing switches) and then crack that. > > etc., etc. > > This is just a few of the methods (and some of the more "script kidddy" > methods aswell.. none of it is too clever) to bypass MS models. > > > Carric Dooley CNE > COM2:Interactive Media > http://www.com2usa.com > > > "But this one goes to eleven." > -- Nigel Tufnel > > > On Sat, 26 Aug 2000, BY wrote: > > > > > Hi there, > > > > I find this is really very annoying. The user with only a common domain > user > > priviledge who has no even power user priviledged. How does he find out > the > > local administrator's and even the domain account administrator's password > ? > > I just hope he is lying to us. Cant really tell with his cheaky face > though. > > > > I am surprised that there is a hacking tool that can explore anyone's > > password with just a common domain user's priviledge account ? Can > somebody > > what would the possible hacking tools he is using ? > > > > A Big Thank You ! > > > > BY > > > > > > > > > ============================================================================ > ==== > > To unsubscribe from this mailing list, please see the instructions at > > http://www.checkpoint.com/services/mailing.html > > > ============================================================================ > ==== > > > > - > [To unsubscribe, send mail to [email protected] with > "unsubscribe firewalls" in the body of the message.] > ================================================================================ To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================================================
|