HP3000-L Archives

February 2002, Week 2

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Denys Beauchemin <[log in to unmask]>
Reply To:
Date:
Mon, 11 Feb 2002 15:30:12 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (26 lines)
No it does not.  The password on NT is encrypted by an algorithm going in
one direction only.  When you provide a password at logon, it is encrypted
through the same algorithm and if the result matches the encrypted password
stored, you're in.  The brute force attack simply present a "shipload" of
passwords in the eventual hope of finding one that matches the encrypted one
that is stored on the disk.  Over the network, connecting in the regular
fashion, this type of attack will fail or take such a long time as to be
considered a failure.  On the other hand, if you have direct access to the
machine itself, and you can pull out the file with the encrypted passwords,
all bets are off.

And when is MPE 8.0 slated for?  :)


Kind regards,

Denys. . .

Denys Beauchemin
HICOMP
(800) 323-8863  (281) 288-7438         Fax: (281) 288-7438
denys at hicomp.com                             www.hicomp.com

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2