1996-11-16 - NT insecurity

Header Data

From: Adamsc@io-online.com (Adamsc)
To: “cypherpunks” <cypherpunks@toad.com>
Message Hash: 9056309f4456ec676e2be4f40e50794d2d8c5ba467296ecb0c6358c16b18da28
Message ID: <19961116064952843.AAA201@rn232.io-online.com>
Reply To: N/A
UTC Datetime: 1996-11-16 06:51:58 UTC
Raw Date: Fri, 15 Nov 1996 22:51:58 -0800 (PST)

Raw message

From: Adamsc@io-online.com (Adamsc)
Date: Fri, 15 Nov 1996 22:51:58 -0800 (PST)
To: "cypherpunks" <cypherpunks@toad.com>
Subject: NT insecurity
Message-ID: <19961116064952843.AAA201@rn232.io-online.com>
MIME-Version: 1.0
Content-Type: text/plain


Given the recent comments about insecure machines, I thought it was
interesting to note that you can clear *every* password on an NT box by using
a diskeditor to corrupt the password file (Boot off of a floppy and use
NTFSDOS if you have to).  It'll reboot several times and then you'll be
allowed to login.

#  Chris Adams <adamsc@io-online.com>   | http://www.io-online.com/adamsc/adamsc.htp
#  <cadams@acucobol.com>		 | send mail with subject "send PGPKEY"
"That's our advantage at Microsoft; we set the standards and we can change them."
   --- Karen Hargrove, Microsoft (quoted in the Feb 1993 Unix Review editorial)







Thread