?
Solved

question about active directory on windows 2000

Posted on 2004-04-09
1
Medium Priority
?
159 Views
Last Modified: 2013-12-04
logged in as an administrator how would i access active directory usernames and passwords?? i hear there saved as .dit files in the ntds folder and if it is as simple as just taking them from there is there any sort of encryption??? to the point of lthe system file for Sam files?
0
Comment
Question by:jdissues
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 400 total points
ID: 10795411
They are saved just as they were before, in the SAM of the controllers. atstake.com/products/lc/requirements.html  and many others are able to dump these still, Admin priviledge is still needed. I've tested, it works. The .DIT files do contain info on the username and such... read here:
http://is-it-true.org/nt/nt2000/atips/atips70.shtml

http://support.microsoft.com/default.aspx?scid=KB;EN-US;q299656& (how to get the LM hash's out of the SAM- for they are the weakest)
http://support.microsoft.com/default.aspx?scid=kb;EN-US;223301

What AD brings to the table as far as AUTH that is better than it used to be, is it's much harder to sniff the wire for password hashes. Kerberose is slightly better, however it's still possible to BF. Ntsecurity.nu has some resources about this. So there are a few ways to get the pass's still, the method hasn't changed much.
-rich
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Whether it be Exchange Server Crash Issues, Dirty Shutdown Errors or Failed to mount error, Stellar Phoenix Mailbox Exchange Recovery has always got your back. With the help of its easy to understand user interface and 3 simple steps recovery proced…
Suggested Courses
Course of the Month15 days, 18 hours left to enroll

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question