Extracting the SAM file

Ahem. . . .

If you use Ntpasswd the user's password gets reset. And Sooooo, they know u were in there computer. Hmmmm, don't think that that will help to much if you want to get in there undetected. :p
 
thats why u make a back up of the file

if yuou make a back up file there for after insering your password u activate the back up file or you can just restore your computer back to the dat e you changed it
but good try there
 
this file contains all the password's for teh computer teh password are encrypeted so you would have to extract the hash's if you can do that and crack them you can have full acces to the log ins
 
It doesn't matter what password cracker you use. As long as it does it properly. Also you have to be in a bootable OS to extract the SAM file. You can't be in windows to do it.
 
Well worth USB key

Knoppix happily runs on a 512Mb USB key, with space for a reasonable sized SAM file. Well worth the investment - a dead easy boot to Knoppix, set read/write, disable Admin pwd, grab SAM and run:)
 
Why not use Knoppix from a CD and then just use the thumb drive for the file that way you have plenty of storage for the SAM file?
 
method in my madness

Most of my clients have policies which state - no CD drives or floppy drives on desktop workstations.

As yet, very few have an environment which would let them restrict USB devices:)
 
Back
Top Bottom