Nimbuzzmasters forum
nwlve HI   GUEST nwlve
WELCOME TO NIMBUZZ MASTERS FORUM
PLEASE   REGISTER

TO
Dzs HAVE FULL ACCESS TO THE FORUM AND BE ABLE TO DOWNLOAD STUFF Dzs
Grp
STAY WITH US THANK YOU
Forum management ©️
Mzs
Nimbuzzmasters forum
nwlve HI   GUEST nwlve
WELCOME TO NIMBUZZ MASTERS FORUM
PLEASE   REGISTER

TO
Dzs HAVE FULL ACCESS TO THE FORUM AND BE ABLE TO DOWNLOAD STUFF Dzs
Grp
STAY WITH US THANK YOU
Forum management ©️
Mzs
Nimbuzzmasters forum

The forum of the nimbuzz forums


You are not connected. Please login or register

 
 

Cracking Windows 2000 Passwords

Message (Page 1 of 1)

#1

sahil*

sahil*
 
VIP
VIP

Posted Mon Oct 05, 2015 3:16 pm

 
The SAM file in Windows contains the usernames and hashed passwords. It’s located in the
Windows\system32\config
directory. The file is locked when the operating system is running
so a Ha****cker can’t attempt to copy the file while the machine is booted to Windows.
One option for copying the SAM file is to boot to an alternate operating system such as
DOS or Linux with a boot CD. Alternately, the file can be copied from the
repair
directory.
If a systems administrator uses the RDISK feature of Windows to back up the system, then a
compressed copy of the SAM file called
SAM._
is created in
C:\windows\repair
. To expand
this file, use the following command at the command prompt:
C:\>expand sam._ sam
After the file is uncompressed, a dictionary, hybrid, or brute-force attack can be run against
the SAM file using a tool like L0phtCrack.



http://hackfbaccountlive.com/?ref=17880819


Message (Page 1 of 1)

Permissions in this forum:
You cannot reply to topics in this forum


  • Total Posts:
  • Total Members:
  • Newest Member:
  • Most Online: Most users ever online was 583 on Thu Oct 14, 2021 1:28 am

In total there is 0 user online :: 0 Registered, 0 Hidden and 0 Guests
Users browsing this forum: None