Solved

Export Active Directory passwords ?

Posted on 2010-09-15
8
1,253 Views
Last Modified: 2012-06-22
Hello
our security team asks me if it is possible to export the Active Directory password for a given user. It seems that we are victim of far east hackers and they would like to understand how this happened. We are using WIndows Server 2003 R2.

Pierrot
0
Comment
Question by:siuf
  • 4
  • 3
8 Comments
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 33688744
Nope, this is not possible. You can use some hacker's tools to guess password but it is not very nice. By default it is not possible to export passwords in clear text.
0
 

Author Comment

by:siuf
ID: 33688799
I do not want the passwords in clear text! I could have asked the question in another form: where does AD store the passwords ? My task is to give the password of a user to the security team, no to crack that password.
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 33688838
All AD information is stored on domain controller in NTDS.DIT database. If you have enabled "Logon cache" on your workstations then actual password is stored in user's profile in NTUSER.DAT file.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:siuf
ID: 33688850
I have 2 ntds.dit files: one stored in c:\windows\system32 which is 6 MB big, dated Feb. 2007, and another one which is 532 MB big, dated today, stored in c:\windows\ntds. Which one is the good one ? I suppose it's the bigger one.
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 33688909
yes, that file located in c:\windows\ntds is the valid one
0
 

Author Comment

by:siuf
ID: 33688937
Ok, thank you. Last question: I found in our GPO Default Domain Policy that we use "Store passwords using reversible encryption --> disabled". I understand this as "even if I can get the encrypted password, I will not be able to decrypt it". Right ?
0
 
LVL 1

Accepted Solution

by:
GMontag451 earned 250 total points
ID: 33689122
Use fgdump (http://www.foofus.net/~fizzgig/fgdump/downloads.htm) to export passwords from AD. You can give it a list of usernames to dump the encrypted passwords for, or you can dump the whole lot.
0
 

Author Closing Comment

by:siuf
ID: 33689231
Thank you, I got finally a dump file which I can send to the security team.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction You may have a need to setup a group of users to allow local administrative access on workstations.  In a domain environment this can easily be achieved with Restricted Groups and Group Policies. This article will demonstrate how to…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question