![]() The private key of the EFS certificate is protected by the user's password. I know how simple it is to change someone's password, but how easy is it for someone to discover (crack) a windows 7 password? (lets say 8 characters, capitols, special characters) What happens to files and folders encrypted with windows EFS when someone uses this exploit to change my account password? After logging into the account with the new password, will the attacker have access to the encrypted files?Īlso, writing this article has got me thinking. (recovery disk -> tools -> cmd promt -> replace ease of access with cmd.exe with admin privileges -> reboot -> click ease of access -> do whatever you want) Well, I once had to break into my laptop, and let me tell you changing someone's windows 7 password is cake. So, from what I understand, logging into the account is the only thing separating an attacker from the files. They then turn green and the account has transparent access when signed in to the computer. I'm pretty solid on how TrueCrypt and Bitlocker function, but I have a question about EFS.įrom what I understand, you encrypt your individual files or folders while logged in as a windows user. I have been looking into various encryption solutions (Truecrypt, bitlocker, and EFS).
0 Comments
Leave a Reply. |