Agreed, BIOS passwords are not adequate for more than the casual pest,
but that's why I use encryption too.

After seeing a friend's computer and other items stolen by some of his
'friends', I put a 90 decibel alarm inside the tower I used to have,
set to go off when pulled too far from the wall. It would have been a
bit tricky walking out with a mid tower going BEEP! BEEP! BEEP! for 15
minutes, or sticking around to find a screwdriver, open the tower and
stick the cord back in to silence it.

On Mon, Dec 30, 2013 at 1:00 PM,  <clug-talk-requ...@clug.ca> wrote:
> Send clug-talk mailing list submissions to
>         clug-talk@clug.ca
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> or, via email, send a message with subject or body 'help' to
>         clug-talk-requ...@clug.ca
>
> You can reach the person managing the list at
>         clug-talk-ow...@clug.ca
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of clug-talk digest..."
>
>
> Today's Topics:
>
>    1. Re: clug-talk Digest, Vol 109, Issue 20 (Geekus Villagius)
>    2. Re: clug-talk Digest, Vol 109, Issue 20 (Gustin Johnson)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Sun, 29 Dec 2013 17:37:18 -0700
> From: Geekus Villagius <thevillageg...@gmail.com>
> To: clug-talk@clug.ca
> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 20
> Message-ID:
>         <cadz-tmnuvzsq1ezvuhxduw0kqyitsia_kvzndh2q67rqbvu...@mail.gmail.com>
> Content-Type: text/plain; charset=ISO-8859-1
>
> Thanks for the suggestions!
>
> Re TAILS, I've tried it with legacy boot enabled. No luck from the
> USB. There seems to be issues with certain models. It does work from
> DVD though. I did try with TAILS installer, but the result was the
> same. Perhaps a manual install will do the job?
>
> Re the Windows password, I download Ophcrack (the second try gave me a
> valid image) and was able to boot from that, then found that I had to
> download huge files with which to attack the passwords. Since I don't
> have two or three months to wait for the torrent, I looked around
> until I found a video that showed me how to trick Windows into
> presenting a console on the login screen, from which I could reset the
> password. After that, I could not log on with the user profile, but
> could in safe mode. I'll work on the profile issue tonight, when I get
> home.
>
> The trick I employed requires pretty much any Linux live distribution,
> or, in my case, a Linux distro on another partition. I found certain
> files in the Windows/System32/config folder, did a backup of them,
> renamed them to get a console from an icon on the login screen and
> then entered a command to reset the user's password to whatever I
> wanted. A good reminder of why BIOS passwords exist.
>
> http://www.youtube.com/watch?v=t0U2SmUo8zA
>
>
>
> ------------------------------
>
> Message: 2
> Date: Mon, 30 Dec 2013 07:14:49 -0700
> From: Gustin Johnson <gus...@meganerd.ca>
> To: CLUG General <clug-talk@clug.ca>
> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 20
> Message-ID:
>         <CAPM=hj6uisgea9zhw3e14pcs53_gpjvtrn3damzkwrfy00+...@mail.gmail.com>
> Content-Type: text/plain; charset="utf-8"
>
> BIOS passwords are useless.  They do not protect against two trivial
> attacks:
> 1) Take the hard drive out of the computer, attach it to another.
> 2) Take the CR2032 battery out of the motherboard.  Pull the power.  Wait
> 30 seconds.  Put the battery back in and reconnect the power.  There is now
> no more BIOS password.
>
> Really, the only option is full disk encryption.  The downside is that
> slight disk errors can mean that you lose all of the data on your drives.
>  You also cannot do any real offline data recovery (which is kind of the
> point of full disk encryption).  It really depends on what you are
> protecting against.
>
> Ophtcrack is also not what I would use.  If you really want to recover
> passwords, hashcat (and all the related variants) is  probably what you
> want.  There is a steep but short learning curve with hashcat which means
> that nearly everyone can quickly learn how to use it.  This is pretty much
> the state of the art right now and does not rely on "rainbow" tables.
>
> For changing passwords, chntpw will do this on Windows versions <=7.  You
> just need access to the SAM database (found in the \windows\system32\config
> directory).  chntpw --help should give you enough info assuming you have
> your ntfs windows partition mounted (ntfs-3g is what you want to do this
> with, most modern distributions have this installed and use it by default).
>
> I usually change the local administrator password, then log in with that
> account to change user credentials.
>
>
> On Sun, Dec 29, 2013 at 5:37 PM, Geekus Villagius
> <thevillageg...@gmail.com>wrote:
>
>> Thanks for the suggestions!
>>
>> Re TAILS, I've tried it with legacy boot enabled. No luck from the
>> USB. There seems to be issues with certain models. It does work from
>> DVD though. I did try with TAILS installer, but the result was the
>> same. Perhaps a manual install will do the job?
>>
>> Re the Windows password, I download Ophcrack (the second try gave me a
>> valid image) and was able to boot from that, then found that I had to
>> download huge files with which to attack the passwords. Since I don't
>> have two or three months to wait for the torrent, I looked around
>> until I found a video that showed me how to trick Windows into
>> presenting a console on the login screen, from which I could reset the
>> password. After that, I could not log on with the user profile, but
>> could in safe mode. I'll work on the profile issue tonight, when I get
>> home.
>>
>> The trick I employed requires pretty much any Linux live distribution,
>> or, in my case, a Linux distro on another partition. I found certain
>> files in the Windows/System32/config folder, did a backup of them,
>> renamed them to get a console from an icon on the login screen and
>> then entered a command to reset the user's password to whatever I
>> wanted. A good reminder of why BIOS passwords exist.
>>
>> http://www.youtube.com/watch?v=t0U2SmUo8zA
>>
>> _______________________________________________
>> clug-talk mailing list
>> clug-talk@clug.ca
>> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
>> **Please remove these lines when replying
>>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: 
> <http://clug.ca/pipermail/clug-talk_clug.ca/attachments/20131230/8dbf535e/attachment-0001.html>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> clug-talk mailing list
> clug-talk@clug.ca
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>
>
> ------------------------------
>
> End of clug-talk Digest, Vol 109, Issue 21
> ******************************************

_______________________________________________
clug-talk mailing list
clug-talk@clug.ca
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to