exploit-db-mirror/exploits/windows/local/19192.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

5 lines
No EOL
596 B
Text

source: https://www.securityfocus.com/bid/228/info
During installation of BackOffice 4.0, a file called reboot.ini is created and stored in the \Program Files\Microsoft BackOffice directory. This file contains clear-text usernames and passwords for several services that may be created during installation. These services include: SQL Executive Logon, Exchange Services, and MTS Remote Administration (and potentially others). The File ACLs for this file are set to Everyone:Full Control.
Clear-text usernames and passwords are stored in the \Program Files\Microsoft BackOffice\Reboot.ini file.