With Phoenix universal boot disk to resolve local/domain administrator password lost-vulnerability warning-the black bar safety net

2007-02-04T00:00:00
ID MYHACK58:62200714096
Type myhack58
Reporter 佚名
Modified 2007-02-04T00:00:00

Description

The local administrator password is lost, by deleting the SAM file, or by NTPASSWORD software solution. But to solve the domain administrator password is lost, they can not do anything. Then you need to use“Phoenix universal boot disk”, this article will discuss in detail the use of this disk to resolve the administrator password lost problem. 1, an Internet search for“Phoenix startup disk”or“Phoenix universal boot disk”, about 178M; and 2, Download after decompression, the contents burn into a CD-ROM; 3, with this optical disk to start the computer, showing XP installation interface, Start__ ERD__ Commander__ 2 0 0 2 environment, and the prompt to press F6 to install storage devices, if you need to then you can press F7, behind the discussion; 4, selection menu, select the first item: ERD Commander__ 2 0 0 2; a 5, appears similar to the XP startup interface 6, into the chosen installation path, the General will be automatically detectedoperating system, version and whether the domain controller; 7, similar to XP desktop: select Start/Administrative__ Tools/Locksmith; and 8, into the ERD__ Commander__ 2 0 0 2__ locksmith wizard interface, the next step; 9, Select the Administrator, to reset their passwords; and this time must not manually restart the computer, otherwise the modifications will be invalid 1 0, select Start/Logoff, point OK; 1 of 1, wait a moment, the point of the reboot to restart the computer after Related discussion: A Phoenix boot disk function is powerful, not only crack the local administrator password, including NT/2 0 0 0/XP/0 3 of each version. You can also crack the NT/2 0 0 0/0 3 the domain administrator password, have been experimentally demonstrated. Due to the automatic recognition of theoperating systemand version, and whether or not the DC, so the user in the operation, reset the password the method is the same. In addition it also provides other tools to achieve to modify the registry, restore NTFS encryption software, NTFS FOR__ DOS, multiple card support, making a variety of bootable disk, etc., not repeat them here. Second, some of the old server, the BIOS version is lower, is not fully compatible with ACPI. Installation 2 0 0 0/0 3, The blue screen appears failure: the user is prompted at the system prompt to press F6, do not Press F6 and press F7 to disable ACPI, to complete 2 0 0 0/0 3 Installation. Of course, also possible by upgrading the BIOS to solve it. In short for such a need to press F7 to complete 2 0 0 0/0 3 Installation of the server, using the Phoenix boot disk, select the ERD__ Commander__ 2 0 0 2, at the prompt Press F6 to install a storage device when you press F7, or will blue screen failure. Third, for the 2 0 0 3 domain, the Default Domain Security Policy and 2 0 0 0 the domain is different. Requirements for domain user password must meet complexity requirements, and password minimum length is 7. Password complexity includes three: one is the uppercase letters, lowercase letters, digits, symbols, four, there must be 3 of a kind, the second is the password minimum length is 6, and the third is the password shall not include all or part of the username. So when using the Phoenix boot disk reset 0 3 the domain administrator password, be sure to pay attention to this point. Otherwise it will draw the wrong conclusion: only crack NT/2 0 0 0 domain, not crack 0 3 domain. In other words: if the domain password has been lost, reset the password to meet complexity and password minimum length of 7 conditions, otherwise reset the password will be invalid. Of course, in doing this experiment, you can first reset the Default Domain Security Policy to solve. The operation is as follows: Start/Programs/Administrative Tools/Domain Security Policy/account policies/password policy: Password must meet complexity requirements: from“enabled”to“disabled”; and Password length minimum: from“7 characters”to“0 character”.

To make this policy modify the entry into force of the following methods: 1, wait for the system to automatically refresh the Group Policy, about 5 minutes~1 5 minutes 2, restart the domain controller, and if so modify the user policy, the cancellation can be 3, Use the gpupdate command. Recommended use this Description: 2 0 0 0 used to refresh Group Policy command secedit__ /refreshpolicy__ machine(or user)_policy__ /enforce__ command at 0 3 have been by gpupdate substituted. The command format is as follows: Refresh only the computer policy: gpupdate__ /target:computer Only to refresh user policy: gpupdate__ /target:user Both of which refresh: gpupdate This command also applies to, modify the domain/OU the Group Policy, the desire of the client or the user to immediately take effect. On the client running this command. Automatic refresh interval: DC to DC is 5 minutes, 2 or more multi-DC, the longest may reach 1 5 min, DC to non-DC is 9 0+__ -3 0 minutes, i.e., 6 0~1 2 0 minutes. ,