RE: Active Directory Pentest

From: ragdelaed (ragdelaed@gmail.com)
Date: Wed May 30 2007 - 18:56:09 EDT


http://www.windowsnetworking.com/kbase/WindowsTips/Windows2000/AdminTips/Act
iveDirectory/ActiveDirectorydatabasefileNTDS.DIT.html

it's a file called %SystemRoot%\ntds\NTDS.DIT.

-----Original Message-----
From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com] On
Behalf Of s-williams@nyc.rr.com
Sent: Wednesday, May 30, 2007 5:45 PM
To: Ricardo Mourato; listbounce@securityfocus.com;
pen-test@securityfocus.com
Subject: Re: Active Directory Pentest

Just to clarify you want to know where the users directory (as in OU) or the
username and password storage location?

If so you need to look for the sam file sometime this is backup in a storage
drive before it is transferred to tape. Or just use an app like lcp if you
have some can of access right?
"A wise man ask questions, a fool is afraid of knowledge"

-----Original Message-----
From: Ricardo Mourato <ricardomcm@gmail.com>
Date: Wed, 30 May 2007 10:06:34
To:pen-test@securityfocus.com
Subject: Active Directory Pentest

hi folks, in a costumer network where i'm doing a pentest, i found an
Active Directory Server, this one also runs SQL server 2000 SP1, i've
found that SQL server doenst have a password on the SA account, so it
was easy to get in with NT/SYSTEM, but my question is, where is the AD
users directory located?
tnks in advice

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:50 EDT