Here is the output of the SIDs: From the above list identify the user account with System Administrator privileges.

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool
“SIDExtractor”. Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges.

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool
“SIDExtractor”. Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges.

A.
John

B.
Rebecca

C.
Sheela

D.
Shawn

E.
Somia

F.
Chang

G.
Micah

Explanation:
The SID of the built-in administrator will always follow this example: S-1-5-domain-500



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Chang

Chang

I don’t remember signing up to be an admin.

CIO

CIO

You be the man, Chang! Get busy!