powerfool wrote: » Assuming that whatever password storage mechanism (SAM, passwd, etc) is in encrypted, you will have to decrypt it first. This would either require bruteforcing the key, having the certificate and pin, or keylogging or something similar to get the key. It would go a long way to protect against that... for all intents and purposes, it will be well beyond the skill of most that would try to breach it.
Bokeh wrote: » The boss was amazed that it could be recovered so quickly, but on the other hand, was a bit shocked as well. He asked if we encrypted all our drives, could the passwords still be recovered? I had no idea.
LucasMN wrote: » I would be interested in finding this out as well. I've used Ophcrack a few times and found that it is amazing. I use what I would consider a decently long and complex password. Ophcrack cracked it in a matter of minutes. I haven't used it in awhile, is there a different version for Windows Vista & 7?
RobertKaucher wrote: » Likely because your idea of a complex password is flawed. Mine are on average 25 characters in length and use a combonation of uppercase/lowercase and special characters/numbers. however the words are a ranom combination of dictionary words. Usually 4 to 5.