Author: Xiaoying from web67.cn
One more ice blade is used.
I believe everyone knows about how to crack SAM. In general theory, C: windows (winnt) system32configsam is extracted for brute force cracking. This statement is incomplete, by default, this file cannot be operated. A dialog box is displayed, for example, the sam file to be copied is being used by another person or program.
Is it true that it cannot be cracked? The answer is no. Nowadays, many hackers have turned their eyes to the C: WINDOWSepairSAM backup SAM file. However, after my test, the password can be cracked, but the results are outdated for a long time. How can we get the password used by the system at the time? We have to turn to C: windows (winnt) system32configsam again. Many blackers will ask again: Isn't it true? Yes, but we can use icesword to copy to other paths and crack them.