PaulDotCom mailing list archives
Re: Differences between MSCacheV1 and MSCacheV2
From: "Liam Randall" <Liam.Randall () gigaco com>
Date: Thu, 18 Aug 2011 12:58:42 -0400
Adrian, Tangently related but AD does have some settings to defend against this (on the workstation side... mobile not as well) BTW- looking forward to meeting up with all you guys at Derbycon. Liam Randall <Wall_of_text> --------------------------------------------------------------- Policy Name: Interactive logon: Number of previous logons to cache (in case domain controller is not available) Policy Path: Computer Configuration\Windows Settings\Local Policies\Security Options Supported On: Windows XP SP2, Windows Server 2003 & higher Registry Setting: MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\CachedLogonsCount Description: Interactive logon: Number of previous logons to cache (in case domain controller is not available) All previous users' logon information is cached locally so that, in the event that a domain controller is unavailable during subsequent logon attempts, they are able to log on . If a domain controller is unavailable and a user's logon information is cached, the user is prompted with a message that reads as follows: Windows cannot connect to a server to confirm your logon settings. You have been logged on using previously stored account information. If you changed your account information since you last logged on to this computer, those changes will not be reflected in this session. If a domain controller is unavailable and a user's logon information is not cached, the user is prompted with this message: The system cannot log you on now because the domain <DOMAIN_NAME> is not available. In this policy setting, a value of 0 disables logon caching. Any value above 50 only caches 50 logon attempts. Default: 10 --------------------------------------------------------------- Policy Name: Interactive logon: Require Domain Controller authentication to unlock workstation Policy Path: Computer Configuration\Windows Settings\Local Policies\Security Options Supported On: Windows XP SP2, Windows Server 2003 & higher Registry Setting: MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ForceUnlockLogon Description: Interactive logon: Require Domain Controller authentication to unlock Logon information must be provided to unlock a locked computer. For domain accounts, this security setting determines whether a domain controller must be contacted to unlock a computer. If this setting is disabled, a user can unlock the computer using cached credentials. If this setting is enabled, a domain controller must authenticate the domain account that is being used to unlock the computer. Default: Disabled. Important This setting applies to Windows 2000 computers, but it is not available through the Security Configuration Manager tools on these computers. --------------------------------------------------------------- Policy Name: Network access: Do not allow storage of credentials or .NET Passports for network authentication Policy Path: Computer Configuration\Windows Settings\Local Policies\Security Options Supported On: Windows XP SP2, Windows Server 2003 Registry Setting: MACHINE\System\CurrentControlSet\Control\Lsa\DisableDomainCreds Description: Network access: Do not allow storage of credentials or .NET Passports for network authentication This security setting determines whether Stored User Names and Passwords saves passwords, credentials, or .NET Passports for later use when it gains domain authentication. If it is enabled, this setting prevents the Stored User Names and Passwords from storing passwords and credentials. Note: When configuring this security setting, changes will not take effect until you restart Windows. For more information about Stored User Names and Passwords, see Stored User Names and Passwords. Default: Disabled. --------------------------------------------------------------- </Wall_of_text> From: pauldotcom-bounces () mail pauldotcom com [mailto:pauldotcom-bounces () mail pauldotcom com] On Behalf Of Adrian Crenshaw Sent: Sunday, August 14, 2011 11:49 AM To: PaulDotCom Security Weekly Mailing List Subject: [Pauldotcom] Differences between MSCacheV1 and MSCacheV2 Hi all, Ok, I've been Googling this up and found no answer. My statements in this email may also be wrong, so double check. On WIndows boxes in a domain, the last 10 passwords are saved (by default) as a hash on the local box in case communications to the domain go down. The user name is used as a salt in these hashes. Windows before Visa: uses MSCacheV1 (AKA Domain Cached Credentials) Windows Vista/7/2008: use MSCacheV2 Cain can now dump and crack both, but at 70 attempts per sec with Cain on a newer i7, it's kind of pointless. Hashcat/cudaHashCat seems to be able to crack MSCacheV1 much faster than Cain, but only seems to support MSCacheV1 as far as I can tell. Anyone know what the real differences in algorithm are between the two MSCache versions? As a side note: What do you use for dumping these hashes? I've been using Cain, but would love to hear if there is something better. Thanks, Adrian -- "The ability to quote is a serviceable substitute for wit." ~ W. Somerset Maugham _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Differences between MSCacheV1 and MSCacheV2 Adrian Crenshaw (Aug 15)
- Re: Differences between MSCacheV1 and MSCacheV2 tony_l_turner () yahoo com (Aug 15)
- Re: Differences between MSCacheV1 and MSCacheV2 Dan McGinn-Combs (Aug 15)
- Re: Differences between MSCacheV1 and MSCacheV2 Liam Randall (Aug 18)
- Re: Differences between MSCacheV1 and MSCacheV2 Jeremy Pommerening (Sep 05)