You are the security administrator for a large online auction company based out of Los Angeles.After getting your ENSA CERTIFICATION last year, you have steadily been fortifying your network’s security including training, OS hardening, and network security.One of the last things you just changed for security reasons was to modify all the built-in administrator accounts on the local computers of PCs and in Active Directory.After thorough testing, you found that no services or programs were affected by the name changes.
Your company undergoes an outside security audit by a consulting company, and they said that even though all the administrator account names were changed, the accounts could still be used by a clever hacker to gain unauthorized access.You argue with the auditors and say that is not possible, so they use a tool and show you how easy it is to utilize the administrator account even though its name was changed.
What tool did the auditors use?
A.
Sid2user
B.
User2sid
C.
Fingerprint
D.
GetAcct
Explanation:
User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine Sid2user.exe can then be used to retrieve the names of all the user accounts and more.
Correct answer is A