Date: Sun, 4 Feb 2007 18:43:42 +0300 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: Windows Domain Account Cracking Disclaimer: I'm not familiar with Windows. On Fri, Feb 02, 2007 at 06:15:32PM +0000, Hari Sekhon wrote: > Ok, googling I found pwdump2 ... I suggest that you try one of the newer implementations, such as pwdump6: http://www.foofus.net/fizzgig/pwdump/ pwdump6 is supposed to resolve the LSASS crash syndrome with DEP - this is described right on the above web page. I also have a collection of other PWDUMP tools linked to from here: http://www.openwall.com/passwords/microsoft-windows-nt-2000-xp-2003 And there's a recent one that I haven't gotten around to trying out and listing yet: http://reedarvin.thearvins.com/tools.html (but I expect that you will find pwdump6 to be more mature). > I even tried disabling DEP for lsass but got the same result... I am guessing that you did not really disable DEP. Maybe your change failed to apply to the existing process or something. -- Alexander Peslyak <solar at openwall.com> GPG key ID: 5B341F15 fp: B3FB 63F4 D7A3 BCCC 6F6E FC55 A2FC 027C 5B34 1F15 http://www.openwall.com - bringing security into open computing environments Was I helpful? Please give your feedback here: http://rate.affero.net/solar -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux - Powered by OpenVZ