Originally posted by: RadioActiveMan666
its so nice too know microsoft made it way too easy to hack the password system. Well atleast I know what I need to do next time I need to hack my roommates comp when he's out of town
Originally posted by: Need4Speed
Originally posted by: RadioActiveMan666
its so nice too know microsoft made it way too easy to hack the password system. Well atleast I know what I need to do next time I need to hack my roommates comp when he's out of town
though I'm no fan of MS, its not that hard in linux either....
1. Start your computer. At the LILO prompt, type "linux single." Your machine will now start in single user mode.
2. Type "passwd" and enter the password that you want for your root user. It should then say "all tokens updated successfully."
3. You can now restart the machine shutdown, for now. When the machine restarts, you will be able to log in as root with the new password.
exploiting a box when your physically at the terminal is always much easier.
Originally posted by: elzmaddy
Do you know if email and encrypted files will still be accessible after doing this?
Originally posted by: Need4Speed
though I'm no fan of MS, its not that hard in linux either....
1. Start your computer. At the LILO prompt, type "linux single." Your machine will now start in single user mode.
2. Type "passwd" and enter the password that you want for your root user. It should then say "all tokens updated successfully."
3. You can now restart the machine shutdown, for now. When the machine restarts, you will be able to log in as root with the new password.
exploiting a box when your physically at the terminal is always much easier.
Originally posted by: groovin
can you do somethign similar with Grub boot loader?
its also much easier if u can rip the box off the rack, stuff it down your pants and walk home with it! jk
Originally posted by: prosaic
Files encrypted with EFS under WinXP will NOT be accessible after cracking the password. Insofar as e-mail is concerned, that would depend much upon which e-mail client is being used and which of its security features, if any, have been enabled. - prosaicOriginally posted by: elzmaddy Do you know if email and encrypted files will still be accessible after doing this?
Originally posted by: cleverhandle
Actually, single-user mode still requires a password for most modern distros. It depends on how the inittab is set up. But you can accomplish effectively the same thing with "init=/bin/bash".
Originally posted by: KraziKid
Originally posted by: prosaic
Files encrypted with EFS under WinXP will NOT be accessible after cracking the password. Insofar as e-mail is concerned, that would depend much upon which e-mail client is being used and which of its security features, if any, have been enabled. - prosaicOriginally posted by: elzmaddy Do you know if email and encrypted files will still be accessible after doing this?
Not true. Your user account password is not used in EFS beyond the generation of the cert. The first time you encrypt a file using the EFS, Windows automatically generates a cert with a public/private key. The EFS is implemented using a public/private key encryption. You can view your cert if you want by loading the Certificates Snap-in in the mmc. It should be under: Certificates - Current User -> Personal -> Certificates