Actually Machine password can be extracted from LC3 and higher, done it
myself, and it seems that Windows Choice of Secure password with the
DC's insist that hard to crack. You can also use Opcrack with rainbow
tables, and cachedump or pwdump3e to get the computer account hash and
crack that bugger simply. 
 
I agree, its gotta usuallybe an inside job to get it, and the computer
account could prove less fruitful, than a juicer user account with
higher level access, but its an interesting way to hack I suppose. 
 
TY
Z
 

Edward E. Ziots 
Network Engineer 
Lifespan Organization 
MCSE,MCSA,MCP+I,M.E,CCA,Network+, Security + 
email:[EMAIL PROTECTED] 
cell:401-639-3505 

 

________________________________

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of joe
Sent: Monday, January 08, 2007 3:33 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Risks of exposure of machine account passwords


If an attacker gets access to a machine account password they can
connect to AD as that computer which is usually just normal user access
rights. In fact, if you set up an auth as the computer and tap an ADAM
instance and look at the RootDSE it will show you the groups you are a
member of that are right for that context. For example:
 
>tokenGroups: TEST\TESTCMP$
>tokenGroups: TEST\Domain Computers
>tokenGroups: Everyone
>tokenGroups: BUILTIN\Users
>tokenGroups: NT AUTHORITY\NETWORK
>tokenGroups: NT AUTHORITY\Authenticated Users
>tokenGroups: NT AUTHORITY\This Organization
 
I don't think overall that computer accounts are any more risky than
normal userids. On the flip side, I think it is silly to leave enabled
machine accounts lying around for computers that you are relatively sure
will never reconnect. That is why I wrote oldcmp and make it available
to everyone. 
 
The key part is as Al mentioned, how did they get that password? I don't
recall seeing anything that will extract that from a machine and even
so, I expect it is much easier and useful to target user passwords than
computer passwords - primarily admin type user's. A dirty trick I have
used in the past to disprove how secure an environment was was to set up
a web site on a workstation, enable basic auth only, write a little perl
cgi script to write the creds sent to the website to a log file and
throw up a website unavailable screen and then tell admins that I have a
web site that doens't seem to authenticate users properly could they try
to logon to see if it is just my test IDs or a permission problem. I
would say at least 50%-60% of the time the admins will go to the page
and type in their creds. Alternately try to get an admin to log into a
workstation I control. In far too many cases I think you will find
admins are user's too... :) 
 
  joe
 
 
--
O'Reilly Active Directory Third Edition -
http://www.joeware.net/win/ad3e.htm 
 
 

________________________________

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mr Oteece
Sent: Monday, January 08, 2007 1:39 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Risks of exposure of machine account passwords


What are the risks associated with the exposure of machine account
passwords in Active Directory? Passwords are changed for machine
accounts regularly, but they don't really expire and can get rather old.
If an attacker has access to this password, what sort of access would he
have to other systems on the network via Kerberos? i.e., would he be
able to forge service tickets as other users and elevate his access
elsewhere? The laxness of policy surrounding these accounts suggests
that this is not a huge risk. Should we be more concerned with these old
passwords? 
 
Otis 

Reply via email to