Can I get user passwords from the AD database?
A: The passwords in AD are not stored encrypted by default, so they cannot be decrypted. They are hashed. The only way to recover the data from a hash is with some sort of a hacking algorithm that attempts to crack the hash (such tools exist).
NTDS.DIT database of AD
NTDS.DIT database of AD
database
Normally, recorded passwords are hashed, not kept as they are written. When a user logs in, their password is hashed with the same algorithm used as the recorded ones, and the match is made. That way, if the database is hacked, in theory, the hacker still doesn't have usable passwords.
Gmail itself is a portal for logging in. It contains the database of google ID's and passwords. A user can log himself into using the right credentials.
You can export the user names easily from a Unix password file - it is stored in the /etc/passwd file. The passwords are a different matter because they are hashed and cannot be imported into any other system to be useable. After you export the user names from the passwd file, use the 'dsadd' command of server 2003 to import them. You can give them a random password or a default password with the dsadd command. If you are speaking about exporting from a true database, then that would be dependent on what database you are asking about.
# Where is the AD database held? What other folders are related to AD?
Single-user database support only one user at a time
single-user database supports only one user at a time. In other words, if user A is using the database, users B and C must wait until user A is done. A single-user database that runs on a personal computer is called a desktop database.
For any serious website the owners or administrators do not have access to the user passwords. Passwords stored in a proper system will be unrecognizable and virtually impossible to decipher.
User's last 6 passwords
the ---- of a database presents the views that the end user have