[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: NT insecurity



Really?  Could you provide a reference for this assertion?  What is the
name of the "password file"?  Where is it located on the disk?

I'd be very interested to try this out on one of my test systems,
especially if it is true.  But my experiences with corrupted registry
hives leads me to believe you are incorrect.  NT usually does nothing so
nice when it's registry is corrupted.  That's why we keep "emergency
repair disks" around 8-).
- Ken

>----------
>From: 	[email protected][SMTP:[email protected]]
>Sent: 	Monday, November 11, 1996 9:36 PM
>To: 	cypherpunks
>Subject: 	BoS: NT insecurity
>
>Given the recent comments about insecure machines, I thought it was
>interesting to note that you can clear *every* password on an NT box by
>using
>a diskeditor to corrupt the password file (Boot off of a floppy and use
>NTFSDOS if you have to).  It'll reboot several times and then you'll be
>allowed to login.
>
>#  Chris Adams <[email protected]>   |
>http://www.io-online.com/adamsc/adamsc.htp
>#  <[email protected]>		 | send mail with subject "send PGPKEY"
>"That's our advantage at Microsoft; we set the standards and we can
>change them."
>   --- Karen Hargrove, Microsoft (quoted in the Feb 1993 Unix Review
>editorial)
>
>