I just wondered that is all.
On a M$ AD you can only write not read the hash directly.
Its different on samba4 and thought I would just mention it.
-----Original message-----
> From:Achim Gottinger <
ac...@ag-web.biz>
> Sent: Monday 21st July 2014 18:38
> To:
sa...@lists.samba.org
> Subject: Re: [Samba] Being able to read password hashes
>
> Am 21.07.2014 19:03, schrieb Jefferson Davis:
> > I was wondering about this as we continue our migration.
> >
> > I have a script that my tech's use to temporarily change passwords so that they can login as a user for testing config changes, repairs, etc.
> >
> > While I'm still a bit bent about having to rework my entire freaking account mgmt toolchain due to the massive changes wrought by AD DC functionality in samba4, it's nice to know the functionality we need is there.
> >
> > Now to see if I can locate a reasonably-priced time-travel device on craigslist to allow the extra time needed to do this...
> >
> > ----- Original Message -----
> > With any Microsoft active directory server you can not get access to read password hashes you can only change them.
> >
> > Its the fact I can get the hash so easily and also ever-body else's.
> >
> > I am not all that bothered as for this sysadmin its a Brucie Bonus.
> >
> > Irrespective of the website if its not there all I need to do is throw some cuda cores at
http://hashcat.net/hashcat/ and one way or another I will get it.
> >
> > Should the hashes be so easily available was my main question?
> >
> > I was just wondering what others thought, seems cool enough.
> >
> > Stuart
> >
> >
> > -----Original message-----
> >> From:Rowland Penny <
rowlan...@googlemail.com>
> >> Sent: Monday 21st July 2014 10:24
> >> To: sambalist <
sa...@lists.samba.org>
> >> Subject: Re: [Samba] Being able to read password hashes
> >>
> >> On 21/07/14 10:02,
Philippe...@swisscom.com wrote:
> >>> not cracking : ntlm hash database lookup.
> >> Same difference, the OP said he put a unicodePwd password into a webpage
> >> that deals with NTLM passwords and got his plain password back, or are
> >> you missing the point?
> >>
> >> Rowland
> >>>> -----Original Message-----
> >>>> From:
samba-...@lists.samba.org [mailto:
samba-
> >>>>
bou...@lists.samba.org] On Behalf Of Rowland Penny
> >>>> Sent: Monday, July 21, 2014 10:46 AM
> >>>> To:
sa...@lists.samba.org
> >>>> Subject: Re: [Samba] Being able to read password hashes
> >>>>
> >>>> On 21/07/14 09:29, Stuart Naylor wrote:
> >>>>> ldbsearch -H /var/lib/samba/private/sam.ldb
> >>>> '(&(objectclass=person)(name=Administrator))' name unicodePwd
> >>>>> # record 1
> >>>>> dn: CN=Administrator,CN=Users,DC=office,DC=zentyal,DC=lan
> >>>>> name: Administrator
> >>>>> unicodePwd:: kXh1DQFudwnw+lnHhubyUw==
> >>>>>
> >>>>>
http://www.hashkiller.co.uk/ntlm-decrypter.aspx just took 242ms to return
> >>>> my password
> >>>> Are you sure? you put a unicodePwd into something that cracks ntlm
> >>>> passwords and got your plain password back??
> >>>>
> >>>> Rowland
> >>>>
> >>>>> Only zent1 as its just a VM running a test of Zentyal3.5
> After reading this
>
http://technet.microsoft.com/de-de/magazine/ff848710.aspx the unicodePwd
> is not encrypted and it does not look too difficulta to create the
> plaintext password out of this base64 sequence.
>
> That article also mentiones that this unicodePwd attribute only exists
> on servers having ad lds templates applied whom seem to be not
> neccessary for normal ad behaviour.
>
>
>
>