Teach your Syskey Double encryption cracking techniques-vulnerability warning-the black bar safety net

ID MYHACK58:62201027005
Type myhack58
Reporter 佚名
Modified 2010-05-23T00:00:00


In Windows 2 0 0 0/XP system installation directory there is a“repair”folder, the specific location is: c: WINDOWS epair, where c: is your installation of the system where the drive letter, which holds that the system is installed for the first time after startup to create the registry backup file hackers use this registry backup file to replace the current system in the registry information file, the system will be restored to just after installing the system state. Specific operation method is as follows:

First of all using Windows 2 0 0 0/XP installation CD to boot the system, enter the System Recovery Console, and then the“X: WINDOWSsystem32config”under the file replaced with the“repair”file under the same name file in order to ensure the safety of the system in to be replaced before the best would be“X: WINDOWSsystem32config”folder of the registry file backup. If in Windows 2 0 0 0, Then the corresponding folder to X: WINNT is. in. The specific operation of the command is:

copy windows epairsam c: windowssystem32config copy windows epairsystem c: windowssystem32config copy windows epairsecurity c: windowssystem32config copy windows epairsoftware c: windowssystem32config copy windows epairdefault c: windowssystem32config

The completion of the above replacement operation to restart the computer after you can clear the syskey password, in this case to the Administrator user login system, note that in this case you must enter the system when installed set the Administrator user corresponds to the password. Just like that, hackers would easily break the syskey limit!

Since the“repair”file under the registry file information is the system installation is complete when generated, use this registry file to overwrite the current system registry information, will inevitably lead to most of the software and hardware information is lost, thus after entering the system, the need to re-install the software and hardware aspects of the program, the re-establishment of the user and user group level.