Re: AD password Auditing

From: Joe Traband (jtraband@truarx.com)
Date: Fri Aug 05 2005 - 15:35:56 EDT


You are looking for the SAM file, but I'm sure you've found out that you
can't just copy the SAM file off a running machine. There are two ways
to get the SAM file.

1) Get the backed up SAM file (only can be done if a boot disk was made
with the right options selected) Or
2) Boot into some variant of Linux and get the SAM file

A good tutorial, with step-by-step instructions can be found at
http://www.irongeek.com/i.php?page=security/localsamcrack2

After you have the SAM file, you'll want to run John the Ripper or LC3
(LC5 if you have some money) against the file.

I have yet to find a way to copy the SAM file off a running server. If
anyone can do that, please let me know!

-Joe

-----Original Message-----
From: Lohan Spies [mailto:lohan.spies@ifs-sa.co.za]
Sent: Friday, August 05, 2005 7:43 AM
To: 'pen-test@securityfocus.com'
Subject: AD password Auditing

Hi there,

I want to know how can I copy the AD (Active Directory) database so that
I can run a password cracking tool against the accounts?

Could someone please point me in the right direction regarding the tools
to use and how to copy the db?

Thanks

------------------------------------------------------------------------
------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You
Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
------------------------------------------------------------------------
-------

------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:42 EDT