Most of our login problems here are caused by Android device not getting
password updated.


On Tue, Sep 10, 2013 at 3:42 PM, David McSpadden <[email protected]> wrote:

> Not rootkit, no conficker, but 3 logon hits on the dc’s from the dc’s
> using my creds while I was offline scanning???****
>
> ** **
>
> ** **
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Kelsey, John
> *Sent:* Tuesday, September 10, 2013 11:45 AM
>
> *To:* '[email protected]'
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> Had a similar issue here, I think it was a conficker variant causing the
> problem.  The event gave the address of the offending PC though so it was
> easier to track down.****
>
> ** **
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Webster
> *Sent:* Tuesday, September 10, 2013 11:31 AM
>
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> After 3 days of looking, we gave up for now.  But this will need to be
> resolved before they do their AD migration into the parent company.****
>
> ** **
>
> Thanks****
>
> ** **
>
> ** **
>
> Webster****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Tuesday, September 10, 2013 10:23 AM
>
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> Have you found the bad process yet?****
>
> I am watching my event viewer on the DC’s right now waiting for the hit so
> I can then go into my Procmon and Netmon processes to find it on my machine.
> ****
>
> ** **
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Webster
> *Sent:* Tuesday, September 10, 2013 11:09 AM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> The built-in administrator account.  Tens of thousands of 0x12 and 0x18
> every day.****
>
> ** **
>
> I saved and cleared all the event logs at 7PM on Wednesday and when we
> showed up at 8AM Thursday there were already over 358,000 failed logon
> attempts!****
>
> ** **
>
> Thanks****
>
> ** **
>
> ** **
>
> Webster****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Tuesday, September 10, 2013 10:02 AM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> Just Domain admins?****
>
> ** **
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Webster
> *Sent:* Tuesday, September 10, 2013 10:54 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> I faced the same issue last week.  We were unable to determine the cause
> of the mysterious attempts to lockout the domain admin administrator
> account.  There were no services or scheduled tasks that used that account
> and even using “rundll32 keymgr.dll,KRShowKeyMgr” showed no cached
> credentials on any of the computers.****
>
> ** **
>
> The DC’s security event logs are being flooded with 0x12 and 0x18 errors
> for eventids 675 and 680.****
>
> ** **
>
> I am interested in also seeing what the lists suggests for tracking this
> down.****
>
> ** **
>
> Thanks****
>
> ** **
>
> ** **
>
> Webster****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Tuesday, September 10, 2013 9:25 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] Logon sniffing tool****
>
> ** **
>
> My machine is trying and failing to log into the domain about every 6
> minutes.****
>
> What tool can I use to find the process, service, or program that is
> attempting to log in with a bad password?****
>
> Windows 8 64 bit failing with a 2008 AD.****
>
> Event id 675 code 0x18****
>
> ** **
>
> ** **
>
> *Thank you*
>
> * *
>
> *David W. McSpadden*
>
> * *
>
> *B*egin Planning****
>
> *A*rrange for Reconnaissance and Coordination****
>
> *M*ake Reconnaissance****
>
> *C*omplete Plan****
>
> *I*ssue Order****
>
> *S*upervise****
>
> ** **
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
> ** **
>
> Please consider the environment before printing this email.****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
> ** **
>
> Please consider the environment before printing this email.****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
> ** **
>
> Please consider the environment before printing this email.****
>
> This email and any attached files are confidential and intended solely for
> the intended recipient(s). If you are not the named recipient you should
> not read, distribute, copy or alter this email. Any views or opinions
> expressed in this email are those of the author and do not represent those
> of the company. Warning: Although precautions have been taken to make sure
> no viruses are present in this email, the company cannot accept
> responsibility for any loss or damage that arise from the use of this email
> or attachments.****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.
>
> Please consider the environment before printing this email.
>



-- 
smsadm

Reply via email to