Solved

question about active directory on windows 2000

Posted on 2004-04-09
1
154 Views
Last Modified: 2013-12-04
logged in as an administrator how would i access active directory usernames and passwords?? i hear there saved as .dit files in the ntds folder and if it is as simple as just taking them from there is there any sort of encryption??? to the point of lthe system file for Sam files?
0
Comment
Question by:jdissues
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 100 total points
ID: 10795411
They are saved just as they were before, in the SAM of the controllers. atstake.com/products/lc/requirements.html  and many others are able to dump these still, Admin priviledge is still needed. I've tested, it works. The .DIT files do contain info on the username and such... read here:
http://is-it-true.org/nt/nt2000/atips/atips70.shtml

http://support.microsoft.com/default.aspx?scid=KB;EN-US;q299656& (how to get the LM hash's out of the SAM- for they are the weakest)
http://support.microsoft.com/default.aspx?scid=kb;EN-US;223301

What AD brings to the table as far as AUTH that is better than it used to be, is it's much harder to sniff the wire for password hashes. Kerberose is slightly better, however it's still possible to BF. Ntsecurity.nu has some resources about this. So there are a few ways to get the pass's still, the method hasn't changed much.
-rich
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
OSSEC, can't pull in System and Application logs. 11 114
SID change in file permissions 3 137
Need to disable SSL Cipher 7 150
Laptop "remote wipe" -- stolen ? 10 111
Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question