I know I have seen this before, but for the new Netware systems they don't store the NDS files in a hidden directory, nor do they place them in a DSREPAIR.DIB file to break apart with PANDORA or IMP. Is there something that can be done to perform password audits on files that are created during a pen-test. Obviously if have access to run the DSREPAIR util I can create my own acct and see whatever I want. Problem is this isn't just a hack, it's a pen-test and I want to break as many passwords (instead of reconfiguring them) as possible. -Thanks. _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
This archive was generated by hypermail 2b30 : Wed Feb 12 2003 - 10:29:21 PST