"l0phthcrack" should work,  since the "rocket scientists" in Redmond have still
retained the "NetBIOS" version of the password (the old "Windows for Workgroups"
version) in the SAM.   So much for improved security...
(HA HA HA HA HA HA HA !!!!)

Roel Vanhout wrote:

> Do you have code on how it is encrypted? 'on a windows 2000 box' doesn't
> say much. Windows passwords are stored in the sam database, in a binary
> format, unreadable by users (and even by admins). You can brute force
> those with l0pthcrack (www.l0pht.com), I don't know if it works for windows
> 2000.
>
> On Thu, Apr 12, 2001 at 04:22:27PM -0700, Alan Halls wrote:
> > I have a flat txt file that I need to decrypt so that I can build a new
> > database for membership. It was encrypted on a Windows 2000 box. Here is an
> > example of the format:
> >
> > mystic:kdYE[JQKAZAKaMZEKWNeL:
> > mr:ihIAUNUYBACYUZeK_^]d:
> > jr:bxX[TMcaXAeIed__[LWN:
> >
> > Anybody have any suggestions?
> > Alan
>

Reply via email to