Full Disclosure mailing list archives
Disabling Cached Logon Credentials
From: <dwr3ck () hushmail com>
Date: Tue, 30 Dec 2003 10:28:34 -0800
Disabling cached logon credentials is on virtually every server hardening checklist. If you have your servers physically secured in a data center what is the real benefit of disabling cached logon credentials? Whenever a server is off the network, admins have to obtain the local admin password. Depending on how you handle local RID=500 account passwords this can add significantly to downtime when resolving issues. Does anyone know of a way to exploit cached credentials over the wire? If someone has physical access to a system they own it anyway: http://home.eunet.no/~pnordahl/ntpasswd/ Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Disabling Cached Logon Credentials dwr3ck (Dec 30)
- Re: Disabling Cached Logon Credentials Nicolas RUFF (lists) (Dec 31)
- <Possible follow-ups>
- RE: Disabling Cached Logon Credentials Nick Duda (Dec 30)
- RE: Disabling Cached Logon Credentials dwr3ck (Dec 31)
- RE: Disabling Cached Logon Credentials Nick Duda (Dec 31)