Subject: | |
From: | |
Reply To: | |
Date: | Mon, 11 Feb 2002 15:30:12 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
No it does not. The password on NT is encrypted by an algorithm going in
one direction only. When you provide a password at logon, it is encrypted
through the same algorithm and if the result matches the encrypted password
stored, you're in. The brute force attack simply present a "shipload" of
passwords in the eventual hope of finding one that matches the encrypted one
that is stored on the disk. Over the network, connecting in the regular
fashion, this type of attack will fail or take such a long time as to be
considered a failure. On the other hand, if you have direct access to the
machine itself, and you can pull out the file with the encrypted passwords,
all bets are off.
And when is MPE 8.0 slated for? :)
Kind regards,
Denys. . .
Denys Beauchemin
HICOMP
(800) 323-8863 (281) 288-7438 Fax: (281) 288-7438
denys at hicomp.com www.hicomp.com
* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *
|
|
|