Windows server 2008
I am trying to dump password hashes on a win 2008 box but am getting the following error
Logon to \\632\IPC$ failed: error 53.
Anyone with one an idea how to overcome this, micr*****st seem to have removed this share as a security mechanism.
Any who has managed to come up with an exploit for this OS?
Bypassing Windows Server 2008 Password Protection
it is from Milw0rm
you are welcome
I have visited milw0rm and seem not to quite find any win 2008 exploits? Could you kindly offer the milw0rm link with the exploit?
Originally Posted by moonman
Yap, got something from milworm/6824
i think you must activate "Null Session" in the registry, after W2k Null-session ist for default deactivate.
Which specific reg key do you edit?
Originally Posted by ozzy66
Originally Posted by ignited
i dount have a server 2008.. but search by google:
windows server 2008+Null Session+registry