Here is the output of the SIDs: From the above list identify the user account with System Administrator privileges?

Peter extracts the SID list from Windows 2008 Server machine using the hacking tool
“SIDExtracter”. Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges?

Peter extracts the SID list from Windows 2008 Server machine using the hacking tool
“SIDExtracter”. Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges?

A.
John

B.
Rebecca

C.
Sheela

D.
Shawn

E.
Somia

F.
Chang

G.
Micah



Leave a Reply 5

Your email address will not be published. Required fields are marked *


Scott Teegarden

Scott Teegarden

Why?

Bet

Bet

Scott, 500 means true administrator. Remember SID is short for Security Identifier, so each object is associated with a number (SID), the number will indicate what privilege the object has.

Just sad that some people using this site are so think minded and spoils the questionnaire by adding a answer, which any idiot can do.

Scott Teegarden

Scott Teegarden

I agree Bet. Thanks for the response!

PerrimeterRunner

PerrimeterRunner

Yet 500 means true administrator.
Veague, 500 means a thing. In the context of the truest reality and the tree on fire burns to a finite. A finite what, this is science.
Why 500, why not a gastly chart with declaration of variable exemplar graphi 500 is preset to administrator, so the hack does not just pull SIDExtracter file and not the admin. the data has the exact value to all user. I agree, what stump.