Windows server 2008
I am trying to dump password hashes on a win 2008 box but am getting the following error
Logon to \\632\IPC$ failed: error 53.
Anyone with one an idea how to overcome this, micr*****st seem to have removed this share as a security mechanism.
Any who has managed to come up with an exploit for this OS?
Bypassing Windows Server 2008 Password Protection
it is from Milw0rm
you are welcome
i think you must activate "Null Session" in the registry, after W2k Null-session ist for default deactivate.
Which specific reg key do you edit?
Originally Posted by ozzy66
I have visited milw0rm and seem not to quite find any win 2008 exploits? Could you kindly offer the milw0rm link with the exploit?
Originally Posted by moonman
Originally Posted by ignited
i dount have a server 2008.. but search by google:
windows server 2008+Null Session+registry
Yap, got something from milworm/6824