Nmap stealth port scanner
*Intro
*Docs
*Download
Security Tools
Good Reading
Security Lists
*Nmap Hackers
*Nmap Dev
*Bugtraq
*Full Disclosure
*Pen Test
*Vuln Dev
*Basics
*More
News
Links
Exploit World
Advertising
About/Contact
Credits
Sponsors:





Penetration Testing: Re: [PEN-TEST] EUSR_EXSTOREEVENT

Re: [PEN-TEST] EUSR_EXSTOREEVENT

From: Chris Paget <mad.nutter_at_mindless.com>
Date: Tue, 23 Jan 2001 20:08:56 GMT

For anyone that's interested, the password is (without the quotes)
"xyxx1x#y"

Enjoy...

Chris

On Mon, 8 Jan 2001 11:06:28 GMT, I wrote:

>If someone wants to try feeding it into a password cracker, the hash
>is:
>
>EUSER_EXSTOREEVENT:"???????Y":"":7601778855d7ce40b79ae2610dd89d4c:61b03c8a3c17cee9721c0ff0c88c0357
>
>I'm running a brute force L0phtcrack on it at the moment - if I get
>the password, I'll post it here. I've already run a complete
>alphanumeric crack with no success (other than the trailing Y), so I'm
>now doing all characters. Probably take a while though - anyone got
>anything faster than a P3-700 that they can put on this?
>
>Chris
>
>
>On Thu, 4 Jan 2001 05:37:06 -0800, you wrote:
>
>>Has anyone been able to determine the password for the EUSR_EXSTOREEVENT
>>account that gets created when Exchange 2000 is installed? A search on the
>>Internet turned up 50 or so referances to the MS Security Bulliten (MS00-
>>088), but not the password.
>>
>>Thanks!
Received on Jan 23 2001

[ Nmap | Tools | Lists | Reading | News | About/Contact | Advertising | Privacy Policy ]

[ Web Archive generated using Hypermail]