Start or search. Start New Discussion. Create a new discussion If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem.
Track this discussion and email me when there are updates. Reset Post Submit Post. Not quite that simple. You will then need to recreate all the user accounts, restore files from the old instance and then reconnect all of the computers to the domain. Office Office Exchange Server.
Not an IT pro? Resources for IT Professionals. Sign in. United States English. Ask a question. Quick access. Search related threads. Remove From My Forums. On an NTFS system, you can use the Recovery Console to access and delete the file, but only if you have configured the Recovery Console for automatic administrative logon through the local security policy or through the inherited domain security policy.
Another option is to back up the system, reinstall Windows , and then restore the system. As when deleting the SAM, you'll lose your accounts, but at least you'll have the system back with all your other settings intact.
Want more Win2K tips and tricks? Automatically sign up for our free Windows Professional newsletter, delivered each Tuesday!
Miss a column? The same account passwords may be used on other systems on the network. If the attacker can crack one machines admin password that same password may allow the attacker to gain access to other boxes on that LAN that they only have remote access to.
This article assumes that the attacker has only physical access to the machine whose SAM they want to crack and that they also have access to a bootable disk that can read the file system on the target machine.
In my example I will use Knoppix, Gzip and a floppy to copy the files. Issue these commands from a terminal in Knoppix:. This mounts what would most likely be the C: drive on the target machine, it's possible that it could be different.
0コメント