Wrong statement in the second minute. A hash function is not compromised just because it has collisions. By definition, it will have collisions, as the input space is infinitely variant, while the output space is finite, indifferent to the actual length. The question is how easily are you able to find an input that matches the output you have.
@EndermanchАй бұрын
*It has a practically computable collision. You see, this nitpick is very similar to another one that can be applied to what we say about computers in general. We assume computers are fully capable of solving every problem: "We can compute anything!" and then there's the halting problem. We say ECC-384 and RSA-2048 are cryptographically impenetrable, yet it isn't far-fetched to say their inverse problems can be easily calculated in the near future. I deemed it too obvious you can't map an infinitely large set onto a finite one without causing collisions. The finite set simply doesn't have enough alphabet power to contain the information from the infinite one, considering it has a certain finite length. For the very same reason, it's not possible to translate a number from a larger base to the smaller one, say, decimal to binary if we have a length limit on binary. Vastly oversimplified that.
@JonnyPowellАй бұрын
@@Endermanch admit you are wrong, rather than using phrases like “alphabet power” to talk about the cardinality of sets *eyeroll*
@EndermanchАй бұрын
The first line of the reply contains the correction. Cardinality is a much better word to describe that, but it seems you were able to understand precisely what I mean. Nobody taught me neither discrete maths nor set theory in the university and the language barrier does not help :P
@gerooqАй бұрын
@@JonnyPowell Get cooked 🫵😂
@Windows2000Professional.sАй бұрын
@@JonnyPowell Admit you are wrong also. ( I have no f*&?ing idea) about these things.
@camerongamerАй бұрын
You know Enderman is fighting for his life with KZbin when he pulls out the longer intro with the disclaimer.
@TheTR0NaltАй бұрын
KZbin would rather become magenta than ban the ACTUAL BAD CREATORS and ACTUALLY WATCH These Quality videos & approve them
@BrunoDantasS.5655Ай бұрын
@@TheTR0Nalt Yeah, AI is really shit and it should be banned in stuff like this.
@TheTR0NaltАй бұрын
@@BrunoDantasS.5655 I'm don't like ai generated content like how tf are you able to sell ai art and the dog/cat whatever videos are just annoying the only one I like is text to speech Which is the only thing that works in ai
@BrunoDantasS.5655Ай бұрын
@@TheTR0Nalt as an artist myself, I really agree with you. AI generated shit is not the same thing as a person making that same video/music/painting/any form of art, so yeah, imo, AI is only worth it when it helps you in your homework, other than that, it just makes no sense at all.
@SeedАй бұрын
The disclaimer in the description LOL
@funie2Ай бұрын
Lmao.
@rakshanaaaaАй бұрын
"I DO NOT CONDONE NOR SUPPORT ANY OF THE OPINIONS EXPRESSED ON THIS CHATROOM" aah 😭
@XaneMyersАй бұрын
Although disclaimers like this absolutely shouldn't be required, and "risky" videos like this should not be taken down for insane reasons, these disclaimers are always a sign that the video is gonna be *good!*
@trliyАй бұрын
Imagine if it still does get taken down..
@saveliyivanov9943Ай бұрын
FBI is calling...
@InfisraelАй бұрын
The handling of passwords in a Microsoft OS is complex because they use passwords for many usages. The OS (or its domain controller) will store a hashed version of the password, but there are also values which are symmetrically encrypted with keys derived from the password or from the hash thereof. The authentication protocols do not include provisions for exchanging salts when some hashing must occur client side. It is difficult to alter the password processing algorithms without impacting a lot of subsystems and potentially breaking the backward compatibility, which is the driving force of the Windows ecosystem. It goes down to strategic priorities. Microsoft knows that altering password hashing and authentication protocols to include a salt will have some non-negligible costs which they would have to assume (by fixing all the components which are thus affected). On the other hand, not changing the password hashing is rather "free" for them, because a flaky hashing algorithm will not convince customers to switch to other non-Microsoft systems (the OS market is, in practice, a captive market); it takes a lot more to force potential customers to envision an OS switch which is very expensive. Also, password hashing can arguably be qualified as "defence in depth", a second layer which has any impact only once a breach already occurred; as such, it could be presented as being of secondary importance. Therefore, it is logical, if irritating, that Microsoft does not update its poor password processing practices. Historically, Microsoft did only one update, when they switched from NTLM v1 to v2, and it was kind of necessary because the older LM hash was so weak that it was beginning to be embarrassing. My guess is that it involved a lot of internal hassle and they are not eager to do it again.
@alek002Ай бұрын
Cool
@jorocАй бұрын
even if they fix it will just be targeted again and back to the same point
@TheMAZZTerАй бұрын
It's worth keeping in mind users can change their passwords, thus whatever mechanisms are in place have to be able to handle this. Thus switching algorithms or adding a salt can't be too difficult since it could be done at the moment of a password change (which could be forced for all accounts when updating to a new version of Windows). The only problem I can think of is if you have accounts not intended for use by users but by software, changing those passwords would stop the software from working and the software may not have mechanisms in place to anticipate this and make it easy to get the software working again. But I would think this is a small concern.
@𰻝Ай бұрын
Hello ChatGPT!
@InfisraelАй бұрын
@@𰻝 Not AI generated.
@Arctic123YTАй бұрын
I'm downloading this video before it gets taken down by KZbin.
@scriptjsАй бұрын
good idea
@juliantomesheski5364Ай бұрын
same!
@AadiLMughalАй бұрын
But plz if really this video taken down then u upload it from ur yt channel
@Arctic123YTАй бұрын
@@AadiLMughal Maybe
@goobertneliusАй бұрын
Same
@brianbuddy2ACPАй бұрын
When I was a teenager in my early days of computer enthusiasm, I was annoyed that websites would make me set a new password if I forgot it, rather than tell you what it is via email. However, now that I'm far more knowledgeable about this stuff, I actually like that way. Any website that tells you your password via email rather than making you set a new one is storing the passwords unhashed. If you encounter such a website, you should avoid it at all costs.
@emireri2387Ай бұрын
i like how gamebanana does it: giving you a temporary password to log into your account and change the password, i used gamebanana with the temp passwords for weeks.
@MordecroxАй бұрын
Problem is you can't always do that and in my case only recently we got a venue to report these, as those show they fail their duty to protect personal data.
@AffectionateLocomotiveАй бұрын
even steam?
@FluffyFoxUwUАй бұрын
reminds me that one meme about a website where user attempted to login and password is incorrect with error like "Your password is wrong, its XXX's password which is "" try again with XXX account"
@LMiranicАй бұрын
@@AffectionateLocomotive If they send you your password over email it means they know it, which they shouldn't. So yes, even Steam.
@vWinDevАй бұрын
Let's hope KZbin doesn't take this video down.
@OTDFPlayzorStudiosOFFICIALАй бұрын
Yeah
@soundsparkАй бұрын
He's probably hoping KZbin does take it down, especially with the false disclaimer, where while it's a felony to hack someone's computer in the USA, it's more patriotic in Russia.
@Hardcore_RemixerАй бұрын
@@soundspark Bruh 😂😂😂
@swagmuffin9000Ай бұрын
It's probably fine. There are quite a few hackthebox walkthroughs that do worse things than this. This is educational, with the goal to show the security behind the OS, should be fine
@dogyX3Ай бұрын
What the heck, MD4 AND unsalted?? As a wise man once said... "WHAT!?? (pause.) WHAT THE F***"
@whamer100Ай бұрын
ah yes, Mr Jaunt R. On himself. one of the wisest people known to mankind, it's a shame what happened to him on December 15th, 2015, the world will never recover
@projectsspecial9224Ай бұрын
@@dogyX3 to pass export controls
@gregorymorse8423Ай бұрын
Compute an MD4 preimage for a difficult password and then post back here. See you in a few years. MD4 table lookup is a lame excuse for the video title. It's still not easy. The collision stuff is irrelevant
@sasha-fe2blАй бұрын
MD4 was already known to be insecure in 1991 and got retired in 2011...
@mrfoxesite6982Ай бұрын
11s login screen is just 10s with a fresh coat of paint that from 22000.65. 10d is fresh coat of paint from 8s and then 8s is fresh coat of paint from 7s and then vista. your 11 login screen is quite similar to 8.0. it has the same user account password. same welcome screen with same loading circle. i wouldn't be surprised. 8.0 development started before 2011. some parts of 11 login screen can be dated back to vista/xp
@mrfoxesite6982Ай бұрын
11s login screen is basically based mostly on 8.0. it has ties to even vista/xp and even windows nt 4 login screen. wild.
@theairaccumulator7144Ай бұрын
ain't no one care about the security of your windows password, if an attacker got to that point you're already cooked
@sasha-fe2blАй бұрын
@theairaccumulator7144 they shouldn't but it's not good for ppl who use the same password in many places. a better hash function could prevent further damage.
@mrfoxesite6982Ай бұрын
@@theairaccumulator7144 yes
@ENNEN420Ай бұрын
This is giving me flashbacks to my family members losing their windows login passwords and making me retrieve them in high school
@verziscoolАй бұрын
enderman: uses voice, puts calm music also enderman: uses textbox and intense music
@wezu4972Ай бұрын
I liked the old style, got me hooked
@verziscool5 күн бұрын
holy 50 likes never gotten this much
@ararouАй бұрын
Another day, another video of Enderman showing us why Windows security is mostly a joke.
@vaggelis_bestАй бұрын
*absolutely
@ChocoRainbowCornАй бұрын
Man, I wish it wasn't. Windows is one of the better systems out there, security aside. And no, no amount of fanboy talk will ever convince anyone that MacOS or Linux are somehow better, where that pretty much isn't the case, and yet, users of those systems will always make claims saying otherwise.
@jonathandpg6115Ай бұрын
@@ChocoRainbowCornyeah I am sorry but no windows is not ''the best'' you have a pretty closed mind. What you mean to say is they are THE BIGGEST (in the pc market). Windows has a lot of issues with it and has gotten pretty clunky but they don't have to fix anything because they effectively have a monopoly.
@user-to7ds6sc3pАй бұрын
@@ChocoRainbowCorn I run windows, but need linux for some dev stuff. Linux is just straight up better than windows, its smaller, faster, less resources heavy and more secure. The only real downside is that most software is Windows exclusive and that's not a os issue.
@the-answer-is-42Ай бұрын
@@ChocoRainbowCorn I would say which one is better depends on the user. For me and my purposes, Linux is better. For you, Windows is better. I think that's fine. And I agree with you, I wish Windows security was better.
@KippykipАй бұрын
Wait... Can non-administrators access the sam/registry files? In theory, could they copy them from a "secure" corporate machine, to a USB and take it home, import the hives crack it at home? Most corporate PC's have one local admin account for remote IT or troubleshooting.
@EndermanchАй бұрын
You need the administrator token + SeBackup privilege to access SAM. However, the SAM hive is simply a file in %windir%\system32\config, so you can dump it after booting using a USB stick or something along these lines...
@Irongrip62Ай бұрын
If you have physical access you can just remove the harddrive and image it.
@KippykipАй бұрын
@@Irongrip62 I meant for, hypothetically an attacker that wanted to access some confidential corporate data from the local machine. Local admin access is an entry point allowing you to extract the bitlocker key and browse all user profiles etc. ...In minecraft of course.
@Operational117Ай бұрын
@@Kippykip Someone (of at least average IQ) who wants to attack and steal passwords from a high-profile corporation’s central system would probe it for weaknesses and, if needed, install either a rootkit or a backdoor to ensure uninterrupted activity. In a sane world where security is taken seriously, there would be several defense layers to deter, detect and trace any unauthorized attempts to hack their mainframe. … however, we do not live in a sane world… not anymore. If big corporations’ extreme cost cuttings bleed over to their server-side security, it’ll be only a matter of time before we see major leaks and significant damages.
@KippykipАй бұрын
@@Endermanch Ah I see, welp there goes the BitLocker bypass idea.
@cajunvoodoo5930Ай бұрын
There's plenty of policies to configure Kerberos in a domain setting. The threat model here is pretty limited; a stolen, powered off machine would ideally have bitlocker, which would first need to be compromised
@isoettesАй бұрын
So glad for the disclaimer I wouldn't be able to support you if you were an illegal hacker.
@saveliyivanov9943Ай бұрын
Do not use Windows, Linux, OS X or any X86/ARM/RISC/PPC OS. Do not use PC at all. It's bloat
@GeekIWGАй бұрын
Do not use a house. Homes are bloat, plus they usually come with windows.
@johnnymfsu2Ай бұрын
@@GeekIWG try not signing up on earth, it's full of bloat and paywalls, it's bloat
@gianluca458Ай бұрын
An exception will be made for TempleOS.
@Mikko-Maggie-MoreАй бұрын
do not let your mom give birth to you. You will have so many responsibilities and taxes in the future. It's not worth it
@AllOSesOfficialАй бұрын
No I use macOS on a laptop
@W1nd0w55Ай бұрын
The computers at my school all have the password "0" Yea very secure, i know
@GarfieldtheDestroyerАй бұрын
Arguably better than "password" or the classic "1234"
@unconnectedbednaАй бұрын
@@GarfieldtheDestroyer But but... What if I combine them together? "password1234" is safe riiiiiight? xD
@zariyBGАй бұрын
@@unconnectedbednaThrow in a special character to make "p@ssword1234" and it’s the most secure password known to mankind !
@Windows_NT_DudeАй бұрын
IKR?
@mrfoxesite6982Ай бұрын
its school name but what data does it contain? to have such passwords. nothing. just ppts and programs
@ripleyhrgiger4669Ай бұрын
I've no idea why KZbin would take this down. Enderman, I'm new here, and in the first 4 minutes of your video you explained a hash in a much clearer way than I've ever seen it explained before. You've got a great voice for presentation and you do your best to communicate knowledge that is accurate given the information you have at the time it seems. This is educational and something you learn in network security courses so it's not like it's super secret stuff. I hope KZbin doesn't delete anything . Knowledge is important and for those of us who seek it for pleasure; this video is a treasure. Now back to the video!
@meoutpeaceАй бұрын
extended endermanch intro dropped
@R4Y_TWOАй бұрын
Song is called "Landscaping" by "Windows 96"
@glitch1039Ай бұрын
that was a very slick transition into the normal intro, i don't think i've ever seen someone use a previous section of their intro song to extend the intro backwards
@someidiot4311Ай бұрын
hes done it before. i think on either sulfoxide or solaris he added a warning for flashing lights.
@SoukupSoftАй бұрын
@@someidiot4311 He also used this identical "piracy discouraged" intro on Activating Windows 95 with ChatGPT.
@BarraIhsanАй бұрын
@@someidiot4311 yes
@VoxelsticeАй бұрын
Ah yes. Old NT code starting to bite back. Surely this can't get any worse, right? Right???
@WkaelxАй бұрын
Man, I've heard a lot of stories of how NT/Windows are spaghetti at the extreme, Oracle DB levels of sapaghettiness, thats why I don't use it anymore, and now never again. This system is more than compromised.
@Dumb_KilljoyАй бұрын
It drives me nuts how much old NT code is still in Windows. And it isn't just Windows that has that issue. I was using Microsoft Access last week and found a graphic from Windows 9x.
@ChocoRainbowCornАй бұрын
To be fair, security is the biggest thing to worry about. Backwards compatibility with all this old code and software on the other hand though is incredibly useful to have. If people are getting so upset over backwards compatibility being available, even if it's kind of extreme, reaching back to some very old Windows versions, then I think you got other, far deeper and worse issues to worry about.
@WkaelxАй бұрын
@@ChocoRainbowCorn Yes, it makes sense to be compatible with Windows 7, Even XP. But when you get into the NT, 95/98 era this is really concerning, the system has a good looking UI but behind it there is a outdated and unsafe mess of decades of coding.
@ChocoRainbowCornАй бұрын
@@Wkaelx There are ways to keep systems safe and compatible even with the oldest of software you know.. For one thing, dropping 16-bit support as a whole was an massive mistake on Microsoft's part. Sure, nobody uses that today but still. Age of code has nothing to do with how it's written, so also how secure or unsecure it is. It doesn't make any sense whatsoever to argue that there is no point in keeping backwards compatibility even with NT era of things and before/after. Again: If Microsoft doesn't want to bother with making sure Windows can stay compatible all the way throughout it's history but ensure that it's done in an safe manner, then that's not the problem of old, messy code - It's the problem of an lazy, greedy company that doesn't want to bother with things that can absolutely be done.
@rotoguruАй бұрын
Thank you for taking the time to create this content. The security weakness exposed in this video is intentionally left as-is. We understand that three-letter agencies prefer personal computers to lack strong access control, making it easier for them to monitor and conduct forensics. Microsoft willingly complies with that
@jann4577Ай бұрын
Just by definition a hash function with variable input length like a password will have collisions if the output length is fixed. You have unlimited inputs but only limited outputs
@0xGRIDRUNRАй бұрын
while that is mathematically true, the entropy of sha256 is so insanely high that you will not be able to brute force a collision before the heat death of the universe for reference, the amount of outputs that the sha256 algorithm has is 115 quattuorvigintillion, or 1.15*10^77
@jann4577Ай бұрын
@@0xGRIDRUNR shure but the quote in the video is misleading
@0xGRIDRUNRАй бұрын
@@jann4577 ah I see what you mean now. For the sake of this topic, I think the video is fine in its explanation even if it isn't entirely correct. It's a bit much to explain somewhat involved concepts from number theory and cryptography in what is only meant to be a brief introduction to hashes. That said, you aren't wrong.
@twgt666Ай бұрын
yeees voiceovers are back! thank you!!
@its_chaudevАй бұрын
bro didn't get hired 💀
@phizlipАй бұрын
😭
@jeffrey131224 күн бұрын
The salt does not have to be different for every user. It really doesn't even have to be different for every computer. If the salt value is only 16 bits that would cause an attacker to have to generate 65 thousand sets of rainbow tables. Given the amount of time and energy it takes to generate a rainbow table it makes them impractical.
@pundauounАй бұрын
She crack my password till I windows
@Player-fg4ubАй бұрын
i don get it
@какойтошизикАй бұрын
@@pundauoun, i think the last part should be like "till i windows" or something.
@какойтошизикАй бұрын
@@Player-fg4ub, gen alpha memes. Neither i understand it.
@Windows2000Professional.sАй бұрын
@@какойтошизик same.
@justinhamilton8647Ай бұрын
@@какойтошизикyou people are behaving like boomers, so miserable
@JuanGamer0202Ай бұрын
Thank you soo much, I got a hard drive from my campus, they are updating their classroom hardware, it has an original windows xp professional on it but I didnt get the password for it, wich means all I can do is what it was intended for (openning power points and other class related stuff), they told me I should just format it anyway but I'm sucker for windows xp and I'm not giving up on it.
@itskdogАй бұрын
This is one of the good things that come with a Microsoft Account, you can set a PIN (which doesn't have to be just numbers, can just be a password) but it's stored in the TPM, so it's a pain to bypass if you also then turn off password authentication.
@isyt1Ай бұрын
Brilliant! Love the way you explain things. Someone once said - if you can’t explain it to a five year old then you don’t understand it. And that’s exactly how you explain things. So simply. That’s very rare in the IT world. My only negative is you said wallah instead of voila 12:54 😉
@HedgieMaster05Ай бұрын
Maybe I just haven’t seen an Enderman video in a while but I’ve never heard them voiced before
@CanyonSteve-z8jАй бұрын
Hahaha!! You made me laugh so hard when you were looking at printing the registry tree. "Why would anyone want to (print the registry tree)? This is useless". LOL
@olafcioАй бұрын
I loooove your videos, nice that you are restoring the vid schedule 🔥🔥 Keep it up! ❤
@Syhai11Ай бұрын
A other enderman video? Christmas came early!
@davidt9902Ай бұрын
all hashs of N bits will have a collision every approximately 2^N bits. Collisions are impossible to avoid when text is longer than the hash length. But may be computationally impossible to find. (Small note on start)
@inqmusician2Ай бұрын
Fun fact: Mimikatz, instead of doing all of this, captures the NTLM hash that was already used in the session. Maybe that's why MSFT wants you to get an account instead of a local user, because it uses a different algo, instead of an unsalted MD4?
@IceBloxy_Ай бұрын
Enderman is so brave man like he got 2-3 strikes AND HE STILL DID THIS VIDEO
@ArchevodSBАй бұрын
Haven’t seen the long landscaping intro in a while, it’s amazing lol
@pinpointping6175Ай бұрын
You know the videos good when it starts with “This video is for educational purposes only”
@AngeloMichelАй бұрын
Insightful! Great explanation 👍
@makramcАй бұрын
In the beginning I thought: "Hope they dont use MD5" Then you brought up MD4 🤦♂🤦♂
@FalcoGer7 күн бұрын
@1:45 All hash functions contain collisions because their output is fixed length. You can not map an infinite space of inputs onto a finite space of outputs without duplicates. A hash function is compromised not if it contains collisions (that is unavoidable), but rather if it is possible to feasibly calculate collisions, either by analyzing a bad hash function (for example sum all bytes and modulo to get your fixed size) itself and design your input accordingly (for example altering your bytes to fit the criteria), or by brute force trying to find a matching hash for a known hash being feasible because the hash function is just too fast (md5). Of course CRC32 and MD5 are still perfectly valid, but only for data integrity checks where the problem is unreliability, not maliciousness.
@cinderwolf32Ай бұрын
1:35 I feel the need to nitpick here. A hash function is not considered "compromised" because it has collisions. They have a fixed length output and can take inputs of arbitrarily large size, so you have an infinite number of inputs and a finite number of outputs. It is not possible for a hash function to never collide, and SHA-256 is still cryptographically secure. There is no better approach than brute force, and it is completely infeasible with today's technology to reliably find collisions.
@jeffarends8843Ай бұрын
Agreed - this can be demonstrated with the pigeon hole principle: you can't fit n+1 objects into n holes without repeating at least one
@Komi-nv3irАй бұрын
just realized there's a small "easter egg" in VMware window at 11:49, there's a VM called "Windows 12" :p
@Sophron.Ай бұрын
Its from April 1st video
@BrainDamageIVАй бұрын
Lets hope KZbin doesn’t take this down despite there being a warning
@stefanoragone569Ай бұрын
Much respect for you man. You made me learn something new to thi shitty windows world and definetly convincing me to pass to linux. Your channel is so underrated
@imistrzАй бұрын
When the long intro rolled, i already knew it was good. btw, the nostalgia when the intro rolled....
@Windows2000Professional.sАй бұрын
Alright, bet that KZbin will takedown one of the videos again, and we'll have the fiasco again. 💀
@AllOSesOfficialАй бұрын
Hi Enderman, great video. I know what YT did to you, and you got 2 str-whatever. If YT t----- your channel, will you keep uploading on your “Andrew” account or just make a new YT account and just name it Enderman and just continue there? Just asking cause I love your channel. Just be sure to download your videos via YT studio to device (At least your 10 latest) so just incase anything happens, you have a little backup of videos. Just like to know. Love your channel. Have a good day❤
@KCOWMOOАй бұрын
That amazing, never thought about that print function in the registry, seen print button a million times but never thought once of pushing it and seeing what happens, very clever of windows to do that.
@swingtag1041Ай бұрын
Ridiculous. Thanks for sharing. I like the glitch transitions in your edit.
@darakstriken4928Ай бұрын
This is done only for the basic Windows password on a local account right? And not for the Windows Hello PIN or (dare I mention it) a Microsoft account login? If not, that's probably why Microsoft hasn't fixed it. From their perspective they already have fixed it: just use a Microsoft account instead of a password.
@throwaway6478Ай бұрын
Yep. It's also screwed if you have a syskey or Bitlocker.
@lmnkАй бұрын
No one sane in the corpoate segment would use login through a MS account. This is not an excuse.
@throwaway6478Ай бұрын
@@lmnkCorporate is using AD with Kerberos.
@3lH4ck3rC0mf0r7Ай бұрын
The last password used to login to a MS account is saved to allow logging in when a system is offline. Guess where that password is stored?
@3lH4ck3rC0mf0r7Ай бұрын
@@throwaway6478Bitlocker is also quite bypassable for external TPMs if you can find the LPC pins on the motherboard, or with a USB debug cable on Intel-based systems.
@TheTR0NaltАй бұрын
KZbin would rather be magenta and delete enderman's videos but wouldnt ban the elsagate content
@whamer100Ай бұрын
I still cant believe all the things youtube does in the names of protecting kids (just one example, not an umbrella accusation) and then just leaves the elsagate type of content up for all to see. its disgusting and I dont like it
@TheTR0NaltАй бұрын
@@whamer100 I don't think anyone does as it is revolting I can't stand it without reporting it 5 times
@whamer100Ай бұрын
@@TheTR0Nalt The part that gets me even more is the people who create videos talking about the disgusting videos getting taken down for the kind of content that the OTHER videos are showing from being highlighted. It's so backwards
@TheTR0NaltАй бұрын
@@whamer100 yeah like someone named themisterepic got taken down covering this content (it was censored I think) but the original videos are still up
@whamer100Ай бұрын
@@TheTR0Nalt YEAH I REMEMBER THAT
@the-answer-is-42Ай бұрын
I remember taking a course in IT security and as part of it, we extracted hashes from an XP computer using a special program. Think it got the password through the LM hash. It was a while ago now, maybe 15 years or so. Seems things haven't improved as much as it should, unfortunately.
@calorap99Ай бұрын
YOUR CHESS ELO IS 2000!?!?
@ArsenTechАй бұрын
Great Video And Interesting. I hope KZbin Doesn't Take It Down
@medianlaneАй бұрын
Enderman once again breaking Windows and asking KZbin not to take it down
@emre_ezАй бұрын
I love how the intro screen is basically "KZbin for the love of god dont take this down im not teaching people to hack the fbi"
@Jp-ue8xzАй бұрын
At this point it's beyond safe to assume they're doing it intentionally
@asakayosapro27 күн бұрын
of course they are crApple may have secretly followed suit, but of course that's not gonna be public after all, totalitarian shadow govs and their gestoppo thugs gotta have easy backdoors to everything
@alexsd06Ай бұрын
I love videos in which you explain things like these to us!
@narpwaАй бұрын
really interesting video, also lmao so many disclaimers, hope u won't get banned again
@microcolonelАй бұрын
Everyone else for the last 15+ years: let's use computationally difficult functions with quality random salt Windows team: yo I just heard of this MD4 thing!
@mike_dizАй бұрын
Hiding the key in the registry is like... Just what? This is like a crutch of crutches. Who is that even for? What does it protect? From whom?
@RadioactiveBlueberryАй бұрын
Where would you hide it instead? On a DLL that's same for every installation?
@KnockoffFelineАй бұрын
@@RadioactiveBlueberry The parts of the key are stored in separate locations in the registry which are also the same for every Windows installation. Enderman even points this out at 8:25. So, what is your point? Edit: specified that the subkeys are stored in the registry.
@mike_dizАй бұрын
@@RadioactiveBlueberry first of all the dude above is absolutely right. Second of all, yes, a dll or whatever is fine. For some reason linux doesn't have to go through all that bullshit because it actually uses a sane methodology. The password hashes are stored in /etc/shadow and use salt. You can read it only if you have root rights. It works. So your point would be?
@DimkaTsvАй бұрын
@@mike_diz Isn't main difference here is salt? Because you can escalate to Trusted Installer priveleges by using external OS to tamper with hive. Same as you can use new Linux install to access file from another one. So it doesn't matter much where passwords are stored. Main issue is fact that hash is unsalted.
@mike_dizАй бұрын
@@DimkaTsv that's pretty much exactly what I was saying. See my response to radioactiveblueberry. Windows not using salt is bad in the first place, I was pointing out that hiding a key in some insane barely accessible field for no good reason is incredibly weird.
@balt.Ай бұрын
you know a video's gonna be good when it has the extended intro
@ReikiMaulanaАй бұрын
"Security is not about preventing every attack, but about delaying attackers long enough for you to react."
@citybuildmc2516Ай бұрын
as Soon as i see the "This video does not condone or promote hacking or any other illegal activities." Screen i get flashbacks from when enderman couldnt post and had trouble with youtube xD
@electricnezumiАй бұрын
that class name trick is insane lol. security through obscurity and not through, yknow, actual security
@rame.Ай бұрын
i too love cracking passwords legally!
@shape5460Ай бұрын
Don’t keep complaining about Windows, he needs to create his own OS at this point
@originalvegheadАй бұрын
Microsoft have turned crap security into an art form - it has to be deliberate. I stopped using Windows in the 90s after realising how dreadful it was at its core, NT 3.5.1 notwithstanding. In the intervening years I'd assumed that Microsoft would have got its act together and that by now it's probably as secure as anything else. But when I see videos like this in 2024(!) I'm stunned at how pathetic the security still is. The rest of the world has solved these problems, and good security is now accessible to pretty much everyone...except at Redmond evidently. Thanks for this video - it's nice to get a glimpse into world of Windows' cutting edge security failures.
@elvinaguero4651Ай бұрын
Excellent content.
@georgehelyarАй бұрын
I heard years ago that if you have a password over 14 characters then Windows uses a different hashing algorithm or something, can't really remember the details.
@N1klas13Ай бұрын
Not salting passwords in 2024 is wild. Not using a kdf or password specific hashing function too.
@pedzsanАй бұрын
All hash functions have collisions. They have to. When more than N objects are put into N slots, there must be at least one slot with more than one object. I.e. the Pigeon Hole Problem.
@dimitralex18928 күн бұрын
i just want to say that a hash function doesn't hash a string, it hashes bytes. otherwise files could not be hashed. its even visible in ms algorithm (at 4:17): hash = md4-hash of UTF-16 LE encoded X. i know its not the most important correction, but you should be precise with stuff like that and if its simply for the understanding that a string can have different hashes even if the same hash method is used, solely because you have chosen a different character encoding.
@dewmguyАй бұрын
not sure what good a niche use-case like this is; already logged in as admin on a machine is rarely an accident to someone who also has the ability to write a script to pull a hash. it's a clear demonstration of reverse engineering, with some interesting finds, but definitely impractical for the purposes of already being locked out of a bitlocker encrypted windows install.
@bellarobrigues8065Ай бұрын
0:20 i realy like the video tilting
@TerranVisitorАй бұрын
ALL Hash functions WILL theoretically have collision(s) - if the bit length of the source(s) is greater than the bit length of the hash.
@vladislavkaras491Ай бұрын
Huh... Interesting. Thanks for the video!
@OrixinzАй бұрын
if one singular person hits that report button this video will 100% be no more
@DavidMounder9598Ай бұрын
Thanks for the information!
@whamer100Ай бұрын
thats very interesting, I've always wondered if it was possible to crack windows passwords but i did NOT anticipate MD4 of all things...
@gabriledytАй бұрын
I have an issue with Sam module I have installed via pip install Sam but says cannot find f2tdt I didn't find a solution on the internet
@henke37Ай бұрын
The registry api does let you read the class name for the key. It's trivial to automate reading this obfuscated data. Spend an extra hour and add it to the script.
@szymoncwikАй бұрын
Babe wake up new Enderman upload.
@berndeckenfelsАй бұрын
Of course they care - they have alternative hash methods - but they can’t change the NTLM hashes for compatibility - but it’s a good idea to turn them off if not needed anymore
@r6scrubs126Ай бұрын
you're already running as Local System to even access those parts of the registry, so yeah ofc you can get the passwords if you're already running as the highest priv user possible. At that point you already have access to everything on the machine anyway so don't even need to get the user's passwords
@Foxy_ARАй бұрын
Here before the video gets taken down
@vaggelis_bestАй бұрын
Well, you know what they say: "Windows security keeps only the honest people out"...
@j.jarvis746027 күн бұрын
Microsoft: spends billions making next OS "safer" Some KZbinr:
@YoussefGhabri-l7rАй бұрын
Enderman: THIS VIDEO IS MADE BY PROFFESIONALS AND SOLELY FOR EDUCATIONAL PURPOSES Me: WE ALL KNOW IS ENDERMAN A PROFFESIONAL WHY DO U SAY THIS????????? Edit: I mean Enderman is a legend♥
@itsLK.Ай бұрын
Bing bong enderman gone
@zlobsterfulАй бұрын
The real question here is how does one manage to get an animated wallpaper in Windows without any shady malware?
@WincallАй бұрын
Bro has been changed the tile and thumbnail instantly After few days later of uploading this video 😅 I have been back up at this video on my channel so when KZbin has been deleted you can still see it 😂
@Noobmaster69-u8iАй бұрын
Hi sorry if this is a noob question. if the password used is not in the massive database, acquiring the hash doesn’t mean your password can be acquired right?
@EndermanchАй бұрын
It may be computed using bruteforce, as an example. Hash enough random passwords until the hash of the random password matches yours. Voila, that's the hash of your password.
@vgamonitorАй бұрын
Does this work if the account has a PIN or are PINs stored differently?
@bartektmpl2528Ай бұрын
nah it doesn't work with microsoft account
@Randomvideos_yt71901Ай бұрын
Thank you gru for teaching us
@Lavadawg23 күн бұрын
Remember when enderman used tlauncher? He uses prismlauncher now. how old we got 😭
@SalvadorVR_2024Ай бұрын
cracking passwords is wild 💀💀💀💀
@Fortuna1Ай бұрын
disclaimer, dah need save a pc with a idiot password installed on it from your little brother/friend/any family member(actual situation of many users)
@imaguyyesmaleАй бұрын
Uh...what about the sethc bug? Weren't it like, easier i suppose?
@ArturoRacingАй бұрын
bro really said: "Yeah Im not getting another strike, Im going all in on the disclaimers" 😂