Where does Windows (xp) store its users passwords?

Zolty

Diamond Member
Feb 7, 2005
3,603
0
0
lots, you arent going to break it

just reformat or view the drive with knopix
 

BigToque

Lifer
Oct 10, 1999
11,700
0
76
Originally posted by: Zolty
lots, you arent going to break it

just reformat or view the drive with knopix

I'm not trying to break anything, and my machine is running just fine. I'm just curious to know where the passwords are stored.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
I think it's a file called something like _SAM. It'd be a hidden file though. Check out the documentation for l0phtcrack, it should provide more information.
 

spyordie007

Diamond Member
May 28, 2001
6,229
0
0
Originally posted by: kylebubp
I wouldnt bother...

YOU CAN"T BREAK IT!!11!!
Actually if the passwords are weak they can be broken surprisingly easily. Yet another reason strong passwords are a must.
 

Seeruk

Senior member
Nov 16, 2003
986
0
0
Originally posted by: spyordie007
Originally posted by: kylebubp
I wouldnt bother...

YOU CAN"T BREAK IT!!11!!
Actually if the passwords are weak they can be broken surprisingly easily. Yet another reason strong passwords are a must.

But you aint breaking the encryption in that example... you are breaking the user's stupidity
 

kylebubp

Member
Feb 8, 2006
45
0
0
Originally posted by: spyordie007
Originally posted by: kylebubp
I wouldnt bother...

YOU CAN"T BREAK IT!!11!!
Actually if the passwords are weak they can be broken surprisingly easily. Yet another reason strong passwords are a must.



Yeah, I know. I was being sarcastic. It takes bout 1 minute to crack a simple password with L0phtcrack. Thats why on Windows machines I typically just type a line out of a song or something with correct punctuation and spaces for my password. Have fun trying to crack a 25 character password with spaces. Hell, might even throw an ASCII character in as well, just for fun.
 

spyordie007

Diamond Member
May 28, 2001
6,229
0
0
I like to randomly generate them, here is a decent web-based generator for those who need one:
<a target=_blank class=ftalternatingbarlinklarge href="https://www.winguides.com/security/password.php">https://www.winguides.com/security/password.php</a>

I suggest:
1. Randomize the local admin account's password (something long and complex)
2. Store the password offline in a physically secure location (i.e. a safe)
3. Disable the local admin account (it will still work if you need it for safe mode or the recovery console, this prevents it from getting used normally)
4. If it's a domain member use restricted groups from group policy to ensure compliance of the "Administrators" and "Power Users" groups
5. Take a 5 minute break and pat yourself on the back

-Erik
 

Sunner

Elite Member
Oct 9, 1999
11,641
0
76
Originally posted by: kylebubp
Originally posted by: spyordie007
Originally posted by: kylebubp
I wouldnt bother...

YOU CAN"T BREAK IT!!11!!
Actually if the passwords are weak they can be broken surprisingly easily. Yet another reason strong passwords are a must.



Yeah, I know. I was being sarcastic. It takes bout 1 minute to crack a simple password with L0phtcrack. Thats why on Windows machines I typically just type a line out of a song or something with correct punctuation and spaces for my password. Have fun trying to crack a 25 character password with spaces. Hell, might even throw an ASCII character in as well, just for fun.

I tend to just mash my keyboard a little, then change a few small letters for big ones, and I have my pass
 

stardrek

Senior member
Jan 25, 2006
264
0
0
This is an artical made by MS to reset a password on a system "in case you forgot your password": http://support.microsoft.com/?kbid=321305

Just thought you guys might find this interesting.

Using a BartPE live CD you can also reset a password on any windows box no matter if you have created a recovery disk or not. But MS doesn't want you to know.
 

mikeford

Diamond Member
Jan 27, 2001
5,671
160
106
From knowing ZERO it took me a couple days and a few hours of searching, now ANY NT/XP/2K based system is a total open book. Takes about 5 minutes of physical access to the PC and all of the passwords are bypassed, which means all the encrypted files (MS) are also visible.

Don't bother asking or PMing, if you are a site admin, forensic, etc. that needs to use this type of thing, you know about it already.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
Have fun trying to crack a 25 character password with spaces.

Unless you've told the system not to generate legacy LANMAN hashes, you're still screwed.

Takes about 5 minutes of physical access to the PC and all of the passwords are bypassed, which means all the encrypted files (MS) are also visible.

Not true, if you forcibly reset the password the encrypted files will remain encrypted and you'll have just lost the key to decrypt them.
 

ShadowBlade

Diamond Member
Feb 11, 2005
4,263
0
0
google l0phcrack or LC5
it takes about 5 days to decode all windows passwords unless you buy the precomputed hash table discs

EDIT: that was on my old dell 2.4GHz celeron
 

RebateMonger

Elite Member
Dec 24, 2005
11,588
0
0
Originally posted by: Nothinman
Unless you've told the system not to generate legacy LANMAN hashes, you're still screwed.
Microsoft Support: How to prevent Windows from storing a LAN Manager Hash...

"Method 3: Use a Password That Is at Least 15 Characters Long
The simplest way to prevent Windows from storing an LM hash of your password is to use a password that is at least 15 characters long. In this case, Windows stores an LM hash value that cannot be used to authenticate the user."
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
"Method 3: Use a Password That Is at Least 15 Characters Long
The simplest way to prevent Windows from storing an LM hash of your password is to use a password that is at least 15 characters long. In this case, Windows stores an LM hash value that cannot be used to authenticate the user."

If that's true, why do they store anything at all?
 

rmrf

Platinum Member
May 14, 2003
2,872
0
0
Originally posted by: Nothinman
"Method 3: Use a Password That Is at Least 15 Characters Long
The simplest way to prevent Windows from storing an LM hash of your password is to use a password that is at least 15 characters long. In this case, Windows stores an LM hash value that cannot be used to authenticate the user."

If that's true, why do they store anything at all?

ditto.
 

Jeff7

Lifer
Jan 4, 2001
41,599
19
81
Originally posted by: spyordie007
I like to randomly generate them, here is a decent web-based generator for those who need one:
<a target=_blank class=ftalternatingbarlinklarge href="https://www.winguides.com/security/password.php"><a target=_blank class=ftalternatingbarlinklarge href="https://www.winguides.com/security/password.php">https://www.winguides.com/security/password.php</a></a>

I suggest:
1. Randomize the local admin account's password (something long and complex)
2. Store the password offline in a physically secure location (i.e. a safe)
3. Disable the local admin account (it will still work if you need it for safe mode or the recovery console, this prevents it from getting used normally)
4. If it's a domain member use restricted groups from group policy to ensure compliance of the "Administrators" and "Power Users" groups
5. Take a 5 minute break and pat yourself on the back

-Erik


Or for Firefox, ther's the handy SecurePassword Generator
 

spyordie007

Diamond Member
May 28, 2001
6,229
0
0
Originally posted by: Nothinman
"Method 3: Use a Password That Is at Least 15 Characters Long
The simplest way to prevent Windows from storing an LM hash of your password is to use a password that is at least 15 characters long. In this case, Windows stores an LM hash value that cannot be used to authenticate the user."

If that's true, why do they store anything at all?
I'm assuming because the LM hash is provided for backwards compatability and since Win 95/98 doesnt support more than 14 charactors for a password on a NT system there would be no reason to try and create a LM hash if your password was longer (because you wouldnt be able to connect anyways).
 

RebateMonger

Elite Member
Dec 24, 2005
11,588
0
0
Here's how the LAN Manager "Hash" works, and why it's so easy to defeat if you have access to the files.

"The LMHash, also known as the Lan Manager hash, is technically speaking not a hash at all. It is computed as follows:

1. Convert all lower case characters in the password to upper case
2. Pad the password with NULL characters until it is exactly 14 characters long
3. Split the password into two 7 character chunks
4. Use each chunk separately as a DES key to encrypt a specific string
5. Concatenate the two cipher texts into a 128-bit string and store the result

As a result of the algorithm used to generate the LMHash, the hash is very easy to crack. First, even a password longer than 8 characters can be attacked in two discrete chunks. Second, the entire lower-case character set can be ignored. This means that most password cracking tools will start by cracking the LMHashes and then simply vary the alpha characters in the cracked password to generate the case-sensitive passwords."
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
I'm assuming because the LM hash is provided for backwards compatability and since Win 95/98 doesnt support more than 14 charactors for a password on a NT system there would be no reason to try and create a LM hash if your password was longer (because you wouldnt be able to connect anyways).

I know, but you said "Windows stores an LM hash value that cannot be used to authenticate the user.", not Windows doesn't store a LM hash.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |