Posts

Showing posts from January, 2026

What is SAM File and How it is used for penetration testing ?

Image
Windows stores local user credentials in a place most users never see, yet attackers, forensic analysts, and system administrators all rely on it. This component is known as the Security Accounts Manager (SAM) . Understanding how the SAM file works is essential for anyone learning Windows security, digital forensics, or incident response. In this post, we’ll break down what the SAM file is, what it contains, how it is protected, and why it matters from both defensive and forensic perspectives. What Is SAM? SAM (Security Accounts Manager) is a Windows database that stores credentials for local user accounts on a system. It contains information related to: local users groups password hashes account properties Windows never stores passwords in plain text. Instead, it stores cryptographic hashes derived from user passwords inside the SAM database. Location and Structure of the SAM File Primary Location C:\Windows\System32\config\SAM The SAM file is locked while Windows is ...

Why IP address instead of MAC address ?

Image
At first glance, this question feels almost unnecessary. Both IP addresses and MAC addresses are unique identifiers. So why do we use IP addresses for communication across networks instead of MAC addresses? That curiosity pushed me to revisit some networking fundamentals — and the answer turns out to be surprisingly elegant. What Is a MAC Address? A MAC (Media Access Control) address is a unique hexadecimal identifier assigned to a network interface by the manufacturer. Key properties: Assigned at manufacturing time Works at the Data Link Layer (Layer 2) Intended for local network communication Flat addressing (no hierarchy) Although often called “hardcoded,” modern systems can spoof or change MAC addresses — but logically, they are still hardware-level identifiers . What Is an IP Address? An IP (Internet Protocol) address is a logical identifier assigned by: a network administrator, or automatically via DHCP Key properties: Works at the Networ...