Security Basics mailing list archives
RE: Threat vector of running a service using a domain account
From: "Roger A. Grimes" <roger () banneretcs com>
Date: Fri, 14 Sep 2007 15:24:56 -0400
I'm not sure...so I'm just spectulating...but All service account passwords are stored locally in the LSA secrets store. Cachedump only works locally against the cached passwords, left in MEMORY to facilitate service authentications. You can't get to the truly stored hashes on the disk because they are protected by a secure mechanism, so you have to get them in the memory cache area. I'm guessing that the real hash is stored securely. When the service starts up and uses a Kerberos account, the pre-auth hash is sent, and in memory briefly. But after the pre-auth handshake, what is kept in memory is the Kerberos token, which is now used for all future auth. needs for the next 10 hours or more. I could, and may be wrong. Roger ***************************************************************** *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, CISA, MCSE: Security (2000/2003), CEH, yada...yada... *email: roger_grimes () infoworld com or roger () banneretcs com *Author of Windows Vista Security: Securing Vista Against Malicious Attacks (Wiley) *http://www.amazon.com/Windows-Vista-Security-Securing-Malicious/dp/0470 101555 ***************************************************************** -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Ramsdell, Scott Sent: Friday, September 14, 2007 9:01 AM To: Ali, Saqib; Jay Cc: smanaois3 () gmail com; security-basics () securityfocus com Subject: RE: Threat vector of running a service using a domain account Saqib, I believe you're right. Each time I've run cachedump for demonstration I do not receive hashes for services logging in over the network, I only receive hashes for interactive users. Kind Regards, Scott Ramsdell -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Ali, Saqib Sent: Thursday, September 13, 2007 12:42 PM To: Jay Cc: smanaois3 () gmail com; security-basics () securityfocus com Subject: Re: Threat vector of running a service using a domain account
If a server does cache these creditonals then these can be attacked
independant of the AD and its underlying security controls. If a service uses domain credential, do those credentials get cached? I thought only interactive logon credentials are cached. saqib http://security-basics.blogspot.com/
Current thread:
- Re: Threat vector of running a service using a domain account, (continued)
- Re: Threat vector of running a service using a domain account gjgowey (Sep 13)
- Re: Threat vector of running a service using a domain account James Fryman (Sep 13)
- Re: Threat vector of running a service using a domain account jfvanmeter (Sep 12)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 12)
- Re: RE: Threat vector of running a service using a domain account levinson_k (Sep 12)
- Re: Threat vector of running a service using a domain account jfvanmeter (Sep 12)
- Re: Re: Threat vector of running a service using a domain account levinson_k (Sep 12)
- Re: Threat vector of running a service using a domain account Jay (Sep 13)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 13)
- RE: Threat vector of running a service using a domain account Ramsdell, Scott (Sep 14)
- RE: Threat vector of running a service using a domain account Roger A. Grimes (Sep 14)
- RE: Threat vector of running a service using a domain account Ramsdell, Scott (Sep 14)
- RE: Threat vector of running a service using a domain account Roger A. Grimes (Sep 18)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 13)
- RE: Threat vector of running a service using a domain account Ramsdell, Scott (Sep 14)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 14)
- RE: Threat vector of running a service using a domain account Roger A. Grimes (Sep 14)