PrepAway - Latest Free Exam Questions & Answers

who attempt to compromise his newly renamed administrator account. How can a remote attacker decipher the name

Jonathan being a keen administrator has followed all of the best practices he could find on securing his Windows Server. He renamed the Administrator account to a new name that can’t be easily guessed but there remain people who attempt to compromise his newly renamed administrator account. How can a remote attacker decipher the name of the administrator account if it has been renamed?

PrepAway - Latest Free Exam Questions & Answers

A.
The attacker guessed the new name

B.
The attacker used the user2sid program

C.
The attacker used to sid2user program

D.
The attacker used NMAP with the V option

Explanation:
User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine Sid2user.exe can then be used to retrieve the names of all the user accounts and more. These utilities do not exploit a bug but call the functions LookupAccountName and LookupAccountSid respectively. What is more these can be called against a remote machine without providing logon credentials save those needed for a null session connection.


Leave a Reply