PrepAway - Latest Free Exam Questions & Answers

How can a remote attacker decipher the name of the administrator account if it has been renamed?

Jonathan being a keen administrator has followed all of the best practices he could find on securing his Windows Server. He renamed the Administrator account to a new name that cannot be easily guessed but there remain people who attempt to compromise his newly renamed administrator account. How can a remote attacker decipher the name of the administrator account if it has been renamed?

PrepAway - Latest Free Exam Questions & Answers

A.
The attacker used the sid2user program

B.
The attacker guessed the new name

C.
The attacker used the user2sid program

D.
The attacker used NMAP with the V switch

Explanation:
User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine Sid2user.exe can then be used to retrieve the names of all the user accounts and more. These utilities do not exploit a bug but call the functions LookupAccountName and LookupAccountSid respectively. What is more these can be called against a remote machine without providing logon credentials save those needed for a null session connection.

One Comment on “How can a remote attacker decipher the name of the administrator account if it has been renamed?


Leave a Reply