Showing posts with label 4geekS. Show all posts
Showing posts with label 4geekS. Show all posts

Thursday, June 26, 2014

LESS KEVIN=LESS STRESS

Resetting the Windows administrator’s password or Linux root account password is a common troubleshooting practice when faced with systems infected with mailware, data corruption, and system recoveries. This article does not prompt malicious use, but instead stress the point that an account password does not protect your data.
In principle, passwords are stored locally, anything stored locally can be obtained and modified by slaving that physical data. For example, a hard drive can be removed, added to a different computer already running it’s own OS. That drive will now show up as a slave drive and the contents easily accessible. The following tutorial does not use any third party tools, and only relies on the initial media used to install the OS.


Resetting Stock Windows Administrator password using Installation Disc

This method will only work if you have not touched the stock Administrator account that comes with a fresh install of windows 7. By default the Administrator account with a blank password and disabled. In this method we will take advantage of this by enabling the Administrator account via the registry. If you set the built-in Administrator account for your Windows rollouts or your home Windows machines I give you kudos for being a smart user and follow best practices in locking down your computer. However it does add an extra step in resetting the Administrator’s password. But, No problem!
The following two sceniors make use of the Window Installation Disk.
Windows 7 32-bit Professional Installation Disc
**md5
Windows 7 64-bit Professional Installation Disc
**md5
  1. Boot into your Windows Installation Disk

  2. Click Next, and wait for Recovery to scan for Windows OS’s

  3. Click the Windows OS you want and click next. This will bring you to the Recovery Options list. Click command prompt.

  4. Once command prompt opens, type regedit
  5. Regedit will open, click on HKLM, then click File –> Load Hive
  6. Now we need to navigate to the system SAM file located usually D:\Windows\System32\config\SAM ,since C: is the reserved partition Windows 7 makes. If this is not the case you will have to use diskpart on the command line to figure out which drive letter to use.
  7. Give the Loaded Hive a name, this can be anything. I named my testReset. It will now show up in the Registry list.

  8. In this new Hive List, browse to {testReset} –> SAM –> Domains –> Account –> Users –> 000001F4 and modify the Key F4
  9. Locate the hex 11 bit and change it to 10 and click OK to activiate the stock administrator account that is currently disabled.

  10. Restart the system and you should see the Administrator account at the Login Prompt.
  11. Log into the Administrator and use Computer Management to set the password of your account.

Resetting Non-Stock Administrator Password using Windows Installation Disc

  1. Repeat Steps 1-4 from the first method.
  2. We need to load a Registry Hive from the system we are trying to reset the password for. In this case SYSTEM instead of SAM, located D:\windows\system32\config\SYSTEM ,since C: is the reserved partition Windows 7 makes. If this is not the case you will have to use diskpart on the command line to figure out which drive letter to use.
  3. Navigate to the Registry key SetupType located under testReset –> Setup –> SetupType. Modify this DWORD value from 0 to 2 and click OK

    NOTICE: A value of 2 will run the value located in the CMDLine registry key. Value 0 =does nothing and shows the login screen at boot. Value 1 = Runs the value located in CMDLine registry key, but then Restarts.
  4. Edit the registry value of CMDLine
  5. Unload the tesetReset Hive. Click on testReset then click File –> Unload Hive.
  6. Restart the system, you will be preseted with the following command prompt
  7. Now set the Administrator Password via the syntax net user Administrator {passwd}
  8. Type exit, and you should be preseted with the Login Screen. Try the password you just set!!!

Resetting Linux Root Password using Single User Mode

  1. Reset the system and enter editor mode of your Boot loader. In my case Grub. Select the boot line and hit ‘e’
  2. Find the Linux/Kernel Line:
  3. Add single init=/bin/bash to the end of the kernel or linux line(depends on your version.
  4. Boot the changes we just made. In my case and version of grub F10 boots the changes, check with your boot loader, it should be written at the bottom of the editor. As you can see we are dropped into a read only root shell.

    If you try to reset the password now you will recieve this error:
  5. The filesystem will be set in read only mode, which does not allow us to manipulate the password user file. To remedy do the following to mount the volume as read/write
  6. Verify
    Now restart the system and try to log in as root with the passowrd you just set

Thoughts

I hope this article is both helpful and informative. We can see from this article that physical security (the ability to physically obtain) your data is very important. Regardless of the password strenght you choose. There are also preventative measures to take in tadmen with a strong password. Some preventative measures we can utlize are are free are:
  • Windows users can use BitLocker, a free drive encryption software built into windows to prevent a third party or bootable media obtaining or modifying the password file.(SAM file).
  • Windows users can use TrueCrypt, a OpenSource drive encryiption software.
  • Linux users can encrypt GRUB, see this artile.
  • Linux users can also use open source drive encryption to prevent third party or bootable media from obtaining or modifying the password file.(/etc/passwd)

Monday, March 10, 2008

http://www.ifixit.com/info/ID-your-Mac

iFixit > Info > ID Your Mac
Identify Your Computer
G4
Ti/Alum G4
Titanium / Aluminum
iBook G4
iBook G4

Click on your computer to identify the model.
G3
PowerBook G3
PowerBook
iBook G3
iBook G3
Clamshell G3
Clamshell
PowerBook G3 Speeds (MHz) Family/Model #
Wallstreet (PDQ) 233, 250, 266, 292, 300 M4753
Lombard (Bronze) 333, 400 M5343
Pismo (FireWire) 400, 500 M7572
PowerBook G4 Speeds (MHz) Family/Model #
Mercury 15" 400, 500 M5884
Onyx 15" (VGA) 550, 667 M8407
DVI 15" 667, 800, 867 MHz, 1 GHz A1001 / A1025
Aluminum 12" 867 MHz, 1, 1.33, 1.5 GHz A1010 / A1104
Aluminum 15" 1, 1.25, 1.33, 1.5, 1.67 GHz A1046 / A1095 / A1106
Aluminum 15" (Hi-Res) 1.67 GHz A1138
Aluminum 17" 1, 1.33, 1.5, 1.67 GHz A1013 / A1052 / A1085 / A1107
Aluminum 17" (Hi-Res) 1.67 GHz A1139
iBook G3 Speeds (MHz) Family/Model #
iBook Clamshell 300, 366, 466 M2453 / M6411
iBook G3 12" 500, 600, 700, 800, 900 M6497 / A1005
iBook G3 14" 600, 700, 800, 900 M8413 / A1007
iBook G4 Speeds (MHz) Family/Model #
iBook G4 12" 800 MHz, 1, 1.2, 1.33 GHz A1054 / A1133
iBook G4 14" 933 MHz, 1, 1.2, 1.33, 1.42 GHz A1055 / A1134

iBook G3 Clamshell

code warrior