Book now with code EOY2025
it_consultant wrote: » It isn't a password cracker as much as it gives you the ability to blank out an account password, which is just as useful. The download is 3 megs, which is nice.
docrice wrote: » I guess one question I should pose is this: is this exercise to actually recover a password or simply reset a password to get into a machine? Resetting it may cause problems in accessing EFS-encrypted files if the DRA information is lost as well.
eansdad wrote: » Have you tried using a rainbow table generator to generate the table you would need or are you using a generic table?
slye wrote: » No, what do you recommend for a primer on rainbow tables? I like to learn more about them. Gorebrush- I visited the kon-boot website and followed the instructions but everytime I've used unetbootin to put the iso/img on a usb, then boot from the USB the system tells me that bootmgr is missing. I thought booting from the usb would be the same as booting a linux image...Burn ISO Image to USB Flash Pen Drive (Kon-Boot to USB) | Raymond.CC Blog
*Example* title Hiren's Boot CD 11.1 find --set-root /Hiren's.BootCD.11.1.iso map /Hiren's.BootCD.11.1.iso (hd32) map --hook chainloader (hd32) boot
slye wrote: » No, what do you recommend for a primer on rainbow tables? I like to learn more about them.
Devilsbane wrote: » A rainbow table is basically a list of passwords that have already been encrypted. So rather than spending time going through a list of passwords, encrypting them, and then comparing, you can save a ton of time just by comparing the results. Once a match is found, you know what the password is. Of course it is all more complicated than that. Try this on for size. Rainbow table - Wikipedia, the free encyclopedia
Devilsbane wrote: » Where do you guys suggest that I look to find more tables? Free/cheap is always a plus.
gorebrush wrote: » Konboot gets me into Windows machines in mere minutes.
slye wrote: » Thanks! I got it to blank the admin password and get in and start installing updates.
shaqazoolu wrote: » What you could do is just get a couple of GTX295's in SLI and straight brute force them with a CUDA cracking tool...if you had time and money to burn of course. I'm pretty sure some of the CUDA tools are also capable of doing salted SHA-1 hashes too.
Winrtgen from oxit.it isn't bad for free. Most AVs will pick it up so you'll need to use a VM to use it.
gosh1976 wrote: » Hiren's BootCD worked a charm on a windows 7 box for me just yesterday. I just blanked the password to get in.
SephStorm wrote: » Why would anti virus pick up a hash generator?
Devilsbane wrote: » What version do you have? I think I have version 9.8, and I booted up into mini xp mode a couple months ago intending to run a chkdsk on my C: drive, but it wasn't able to see any of my drives. Also, which tool did you use to do that?
gosh1976 wrote: » I have version 10.6. I don't remember what the name of the tool was but it was one of the first few in the menu if I remember correctly.
it_consultant wrote: » I have used that tool countless times and have yet to corrupt a file. Of course, this is only good for Windows local passwords so if you use linux with SALT then this thing wont do it for you.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!