WinAero: RegOwnershipEx

“…

RegOwnershipEx is an application which allows you to do the following tasks:

  • you will be able to take ownership of a registry key with one click (useful to get the full access to the key).
  • you will be able to jump directly to desired registry also with one click.


RegOwnershipEx features the following options:

  • take ownership and provide full access to selected registry key.
  • registry browser for easy registry key selection.
  • favorites – for quick access to your favorite registry locations. It is shared with Favorites menu of Registry Editor.
  • restore ownership feature allows you to restore the ownership and access rights that you have changed early. i.e. this is opposite action for “take ownership”.
  • registry jump feature – you can open the selected key in Registry Editor. It is very handy option when you read some tweaking related article and want to jump to the key mentioned in article.
  • shortcuts for root keys – you may use HKCU instead of HKEY_CURRENT_USER, HKLM instead of HKEY_LOCAL_MACHINE and so on.
  • Multi language support – you will be able to translate application into your native language by simple ini file. Beginning with RegOwnershipEx, all Winaero apps will support such way of localization.

…”

WinAero: RegOwnershipEx

Kapil Arya | Online

Override Windows Password

Whether you have forgotten your own password, or you want to hack into another user account on Windows XP or Windows 7 PCs, here is an easy trick which does not need you to download any third-party utility or run complex commands. You may consider this method a security flaw in Windows, but there are ways that you can also block it before somebody else uses it to get into your PC. However, if you do so, you might not be able to use it yourself if you get locked out of your PC. You might then need to use other resources (like Linux) to crack/reset your password. It is always advisable to enable the ‘Administrator’ account and set a password to it. In this way, you can get into the Administrator account and reset other passwords. Windows XP, Windows Vista and Windows 7 have a built-in feature called Sticky Keys. This is an accessibility feature that was implemented to help people with physical disabilities and also to help reduce the strain of repetitive keystrokes. It helps serializing keystrokes instead of pressing multiple keys at the same time. You can find out more from the system’s control panel. In this article, we’ll show you how to
take advantage of this feature and turn it into a password hacking option.

Kapil Arya | Online

Kapil Arya : Tech Blogger | Override Windows Password

In this article, we’ll show you how to
take advantage of this feature and turn it into a password hacking option. The trick involves replacing the Sticky Keys control panel with the command prompt and then triggering the password reset commands from within the command prompt window.

Kapil Arya : Tech Blogger | Override Windows Password

FW: Microsoft has patched more critical vulnerabilities than 2004 and 2005 combined

Valami igenis történt a biztonság ügyében.

http://feeds.feedburner.com/~r/McafeeAvertLabsBlog/~3/10131365/

Today Microsoft patched 23 vulnerabilities of which 15 are rated critical. One of the critical vulnerabilities, (MS06-040) Service Server vulnerability, can be remotely exploited by an anonymous user on all Windows operating systems and has been labeled a worm candidate.
The update of our graphs of last month is found below. The top graph shows that this year Microsoft has already addressed more critical vulnerabilities than in 2004 and 2005 combined. The bottom graph shows that the number of important vulnerabilities has not changed.Critical Vulnerabilities addressed by Microsoft

 

 

 

 

 

 

 

 

Important vulnerabilities addressed by Microsoft

 

 

 

 

 

 

 

 

 

This month 11 patched vulnerabilities were already public or were already exploited in-the-wild prior to today’s announcements. Among them is the vulnerability in Powerpoint that was exploited in targeted attacks in mid-July.

No need to remind you to review your deployments now!

FW: ISA Server 2004 Best Practices Analyzer

The Microsoft Internet Security and Acceleration (ISA) Server Best Practices Analyzer Tool is designed for administrators who want to determine the overall health of their ISA Server computers and to diagnose current problems. The tool scans the configuration settings of the local ISA Server computer and reports issues that do not conform to the recommended best practices.

http://www.microsoft.com/downloads/details.aspx?familyid=d22ec2b9-4cd3-4bb6-91ec-0829e5f84063&displaylang=en

AntiOnline – Cracking Windows Vista Beta 2 Local Passwords (SAM and SYSKEY) [Windows 2000/XP passwords too]

http://www.antionline.com/showthread.php?threadid=276048
thread-ből egy jó összefoglaló.

Cracking Windows Vista Beta 2 Local Passwords (SAM and SYSKEY)

One of the common things folks stumble across my site in search
of is information on cracking local Windows 2000/XP passwords. I’ve created
quite a bit of content on the subject over the years, and if you want a broader
understanding of the topic please visit these resources:

Text:
http://www.irongeek.com/i.php?page=…y/localsamcrack
http://www.irongeek.com/i.php?page=…/localsamcrack2

Video:
http://www.irongeek.com/i.php?page=…samdump2auditor
http://www.irongeek.com/i.php?page=…asswordCracking

While I was playing around with Windows Vista Beta 2 I decided to see if
some of the old tools for cracking local account password still worked. It would
seem that Microsoft has changed how the SAM file and SYSKEY work in Vista so
none of my old tricks that use to work with NT 4/2000/XP functioned anymore. I
quickly found that most of the current tools as of this writing(Ophcrack 2.3,
Cain 2.9, SAMInside 2.5.7.0, Pwdump3) no longer work, which I have mixed
feelings about. It’s nice to see the extra level of security, but cracking local
passwords was always sort of fun as well as useful from time to time. When I
tried to crack local passwords extracted from copied SAM and SYSTEM hive files I
would get the following errors:

Ophcrack:
"Error: no valid hash was
found in this file"

Cain:
"Couldn’t find lsa subkey in the hive
file."

While tools like Sala’s Password Renew could still be use from a
Bart’s PE boot CD to change any Vista password you wanted, or to create new
admin accounts entirely, sometime you need to know the current administrator
password. Three reasons to want to know a current Windows password without
changing it are:

1. An attacker doesn’t want to tip off the system
administrators. If they notice that the old admin password no longer works they
will get a bit suspicious don’t you think?
2. The same account passwords may
be used on other systems on the network. If the attacker can crack one machine’s
admin password that same password may allow the attacker to gain access to other
boxes on that LAN that they don’t have direct physical access to.
3. To gain
access to data that has been encrypted using Windows EFS (Encrypted File
System). Changing an accounts password may cause this data to be lost, though I
think Sala’s tool may be able to do this without losing the encryption key since
it uses a Windows service to change the local password.

Also of note for
those interested in cracking Windows Vista passwords, it seems that Vista Beta 2
disables LM hash storage by default, so all you can get is the NTLM hash which
can be much harder to crack for reasons stated in my other articles. Another
thing I want to make you aware of is the new BitLocker feature of Windows Vista
can make pretty much everything in this article useless if it’s enabled, but
that’s a topic for another time.

I thought all was lost on the Vista
password cracking front, but after doing some web searching I found that you can
still crack the local passwords if you have the right tools. It would seem that
the folks from Elcom Soft have added support for Vista SAM and SYSTEM hives into
their "Proactive Password Auditor 1.61" tool. Unfortunately PPA is a commercial
application, but they do offer a sixty day evaluation version that does not seem
to be overly crippled. Since Elcom figured out how to do it I’m sure that soon
the free tools like Cain and Ophcrack will also. What follows are the basic
steps to crack/audit local Windows Vista Beta 2 passwords with Proactive
Password Auditor.

You need to be able to read the drive Windows Vista is
installed on. For NTFS drives I’ve used the Knoppix (
http://www.knoppix.org/ ) and
PE Builder (
http://www.nu2.nu/pebuilder/ ) boot CDs with good success. The
first step is to boot from a CD-ROM and copy off the SAM and SYSTEM files in
C:\WINDOWS\system32\config (you may have to get a slightly older version of them
from C:\WINDOWS\config\RegBack instead, also keep in mind that C: may not be
your system drive in which case substitute the appropriate drive letter ). The
SAM and SYSTEM files are likely to be too large to fit on a 1.44MB floppy unless
you compress them using Gzip in Linux or some Windows compression tool in Bart’s
PE. You could also copy them to some other form of removable media (Thumb drive
anyone?) or upload them across the network to an FTP or file server that you
have access to. For the Gzip/Floppy instructions read my first tutorial linked
at the top of this article. It modern times it’s usually easiest to just drag
and drop the SAM and SYSTEM to a file server using the GUI that comes with your
Boot CD.

Now that you have a copy of the SAM and SYSTEM hive files start
up Proactive Password Auditor and follow these steps:

1. Choose the radio
button labeled "Registry files (SAM, SYSTEM)" under the hashes tab, then click
dump.
2. Choose the SYSTEM and SAM files you want to use, then click the
"Dump" button.
3. During the Dump phase Proactive Password Auditor
automatically tries a simple brute-force attack so your passwords may already be
cracked. If not, choose the attack type, and set the hash type to "NTLM attack"
since there are no LM hashes. I’ll choose the Dictionary attack, click the the
"Dictionary list…" button under the "Dictionary" tab and point it at the word
list that comes with Cain (C:\Program Files\Cain\Wordlists\Wordlist.txt).
4.
Make sure the check boxe(s) next to the account(s) you want to try to crack are
selected.
5. Now it’s just a matter of clicking the menu item
"Recovery->Start recovery", waiting, and hoping for the best.

Assuming
the password is simple enough you should now have a cracked password to work
with. Keep in mind that there’s no guarantee that you will be able to crack any
passwords at all. If the password is not in your dictionary you will have to
resort to a Brute-force attack which could take forever if the password was
chosen well, but this should get you going in the right direction. Also, if you
have large Rainbow tables on your system give them a shot as Proactive Password
Auditor supports this cracking method. I plan to update this page once Cain or
Ophcrack support Vista. Please send me an email if you notice before I do that
any of the free tools have implemented Vista SAM/SYSTEM file support.
Thanks.

Useful links:
Sala’s Password Renew
http://www.sala.pri.ee/

Bart’s Pe Builder:
http://www.nu2.nu/pebuilder/

Oxid.it’s Cain Web Page:

http://www.oxid.it/cain.html

Ophcrack
http://ophcrack.sourceforge.net/

Proactive Password
Auditor 1.61
http://www.elcomsoft.com/ppa.html

__________________
http://www.irongeek.com
http://www.antionline.com/showthread.php?threadid=276048

FW: Backup or Restore Windows XP without new activation

You have thirty days to activate a new installation of Microsoft Windows XP before it stops working until you finally activated the installation. Activation works this way that you have to provide an installation number to Microsoft either by internet or by phone. If you change hardware or install the operating system again you will have to activate the product again as well. This does not make sense in my opinion but hey, they surely have an important reason for this procedure.

http://www.ghacks.net/2006/07/18/backup-or-restore-windows-xp-without-new-activation/

FW: Step-by-Step Guide for Setting Up a PPTP-based Site-to-Site VPN Connection in a Test Lab

Overview
               
                               
                               
This guide describes the
configuration of a Point-to-Point Tunneling Protocol (PPTP)-based site-to-site
virtual private network (VPN) connection using five computers in a test lab. The
VPN connection described in this guide enables you to simulate and observe
Microsoft® Windows® Server™ 2003 site-to-site VPN functionality. The VPN
connection described in this guide is for testing purposes only, and cannot be
used in a production environment.This guide assumes familiarity with
Transmission Control Protocol/Internet Protocol (TCP/IP), IP routing, and the
capabilities of the Windows Server 2003 Routing and Remote Access
service.
               
Download At Source:
http://bink.nu/Article7792.bink

FW: Identity Of Jack the Ripper Finally Revealed

Na most itt egy szó sincs pwd crack-ről 🙂 Csak a névadó.

A couple of handwritten sentences in the margins of a book are claimed to have solved Britain’s greatest murder mystery: the identity of Jack the Ripper.
The notes, written more than 80 years ago by the detective leading the hunt for the serial killer, name a Polish barber called Aaron Kosminski as the chief suspect for the multiple murders.

http://www.shoutwire.com/default.aspx?p=comments&id=19912