User accounts have gone missing!

Y

Yousuf Khan

Really? So your computer destroyed itself all by itself?
WoW! I've never heard that one before.
Well, maybe capin' crunch has used that excuse for his incompetence.
You've never heard that one before? Never heard of a server before? Not
very experienced are you?

Yousuf Khan
 
Y

Yousuf Khan

Well, your anti-Killfile strategy and your bad manners,
and arrogance show your true colors. Quite obviously nobody
wants to interact with you unless you pay them to. Please
go away now.

Arno
This thread is already ready for the bit-bucket. I got the answer I
needed. The rest of this is just name-calling.

God, who'd have thought there was somebody who made Rod Speed look like
a gentleman? :)

Don't reply, the thread will have already have been ignored. :)

Yousuf Khan
 
T

Tom Del Rosso

Parko said:
I've used this quite successfully in the past. Fairly straightforward
to use.
http://pogostick.net/~pnh/ntpasswd/
These things make me nervous, since neither the NTFS file system nor the SAM
file format is documented. I wish they'd just read the file and tell me
what the password is instead of changing it.
 
S

Sunny Bard

Tom said:
These things make me nervous, since neither the NTFS file system nor the SAM
file format is documented. I wish they'd just read the file and tell me
what the password is instead of changing it.
That would require the password itself to be stored *in* the file, which
it isn't, and you probably don't want to spend hours/days l0phtcracking
it ...

Peter's boot CD/USB is fine, as a get out of jail free card.
 
B

Bob I

These things make me nervous, since neither the NTFS file system nor the SAM
file format is documented. I wish they'd just read the file and tell me
what the password is instead of changing it.
Some security that would be.
 
P

Parko

These things make me nervous, since neither the NTFS file system nor the
SAM file format is documented. I wish they'd just read the file and
tell me what the password is instead of changing it.
The password files are encrypted. It's called security.



--
Where's the cursor?
Where's the eraser?
Where's the cursor?
Where's the eraser?
G-O-H-O-H-O-9-O
G-O-H-O-H-O-9-O
G-O-H-O-H-O-9-O
H-O-9-O-G-O-H-O
 
T

Tom Del Rosso

Bob said:
The password and account ARE secure, you won't be accessing the
account's encrypted files with a changed or flattened password.
So it puts the new password somewhere else? Where?
 
R

Rod Speed

Tom Del Rosso wrote
Bob I wrote
So it puts the new password somewhere else?
Nope, it puts it in the same place, but encryption is a completely different process to decryption.

In fact when checking whether the password has been entered correctly when say logging
on, the password entered is encrypted and the encrypted form is compared with the stored
encrypted form of the original password and if they match, the password is correct. Thats
nothing like decrypting the stored form of the original password.

In fact it isnt even possible to reverse some forms of encryption at all, they are one way encryptions.
Same place the original was stored.
 
T

Tom Del Rosso

Rod said:
Tom Del Rosso wrote


Nope, it puts it in the same place, but encryption is a completely
different process to decryption.
In fact when checking whether the password has been entered correctly
when say logging on, the password entered is encrypted and the encrypted
form is
compared with the stored encrypted form of the original password and if
they match, the
password is correct. Thats nothing like decrypting the stored form of the
original password.

In fact it isnt even possible to reverse some forms of encryption at
all, they are one way encryptions.
Thanks. That's it then. I'm aware that there are non-reversible
encryptions, but I didn't consider that possible, because years ago I used
another password cracker (fee-based, from a commercial operation) to recover
a password from a Win2k system. It required copying the sam file and
emailing it to them. I guess they did it by brute force, until they found a
password that created the same encrypted data. I had always assumed they
decrypted it.
 
B

Bob I

Thanks. That's it then. I'm aware that there are non-reversible
encryptions, but I didn't consider that possible, because years ago I used
another password cracker (fee-based, from a commercial operation) to recover
a password from a Win2k system. It required copying the sam file and
emailing it to them. I guess they did it by brute force, until they found a
password that created the same encrypted data. I had always assumed they
decrypted it.
FWIW, a similar "cracking" method is used against MS Office documents,
brute force gets you some character string that provides the same
"hashcode", it opens the file but most likely wasn't the password
actually used.
 
A

Arno

FWIW, a similar "cracking" method is used against MS Office documents,
brute force gets you some character string that provides the same
"hashcode", it opens the file but most likely wasn't the password
actually used.
This is possible, BTW, because the people designing this system
did not have a clue and selected a too short hashcode.

The whole thing is derived from Unix password handling (which is
secure and works), but got broken in the process. No surprise when
looking at who did this....

Arno
 
D

David Brown

Thanks. That's it then. I'm aware that there are non-reversible
encryptions, but I didn't consider that possible, because years ago I used
another password cracker (fee-based, from a commercial operation) to recover
a password from a Win2k system. It required copying the sam file and
emailing it to them. I guess they did it by brute force, until they found a
password that created the same encrypted data. I had always assumed they
decrypted it.
Yes, these things are done by trial and error. Often such a company
will have large "rainbow" tables - they take tables of likely passwords
(such as common kids names, common pet names, misspellings of
"password", birthdays, etc.), dictionaries, etc., and run each one
through the password encryption algorithm. Then "cracking" the password
is as simple as looking it up in this table. If they get a match, they
have the original password. If not, then they need to run through
exhaustive searches.



If you ever have to break into a windows system again, it is a lot
easier to use a windows password reset live CD. These don't make any
attempt to identify the old password, but simply replace it with a known
(blank) one. It's a lot faster and cheaper than an external company.

If you actually need to recover the password rather than just change it
to something you know, there are again free tools for that.
 
A

Arno

Yes, these things are done by trial and error. Often such a company
will have large "rainbow" tables - they take tables of likely passwords
(such as common kids names, common pet names, misspellings of
"password", birthdays, etc.), dictionaries, etc., and run each one
through the password encryption algorithm. Then "cracking" the password
is as simple as looking it up in this table. If they get a match, they
have the original password. If not, then they need to run through
exhaustive searches.
The accepted countermeasure to Rainbow Tables is salting, i.e.
to add a non-secret random value. This increses the size of the
Rainbow Table to infesability. As Microsoft is not familiar with
salting, they do work there.
If you ever have to break into a windows system again, it is a lot
easier to use a windows password reset live CD. These don't make any
attempt to identify the old password, but simply replace it with a known
(blank) one. It's a lot faster and cheaper than an external company.
I second that. I did this several times with good success and
very reasonable effort.
If you actually need to recover the password rather than just change it
to something you know, there are again free tools for that.
Whether that works depends strongly on the individual password
scheme. MS is incompetent here (otherwise breaking would not
work at all for good passwords), but even they made improvements.

Here is an example illustratiung the "security mind-set" at Microsoft:
http://catless.ncl.ac.uk/risks/17.12.html
Scroll down to ''Microsoft "Bob" passwords''

Arno
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top