Re: Flaw in Microsoft Domain AccountCachingAllows Local Workstation Admins to TemporarilyEscalatePrivileges and Login as Cached Domain Admin Accounts(2010-M$-002)

From: Stefan Kanthak <stefan.kanthak@nexgo.de>
To: bugtraq@securityfocus.com,full-disclosure@lists.grok.org.uk
Cc: StenoPlasma@exploitdevelopment.com
Subject: Re: Flaw in Microsoft Domain AccountCachingAllows Local Workstation Admins to TemporarilyEscalatePrivileges and Login as Cached Domain Admin Accounts(2010-M$-002)
Date:


"StenoPlasma @ ExploitDevelopment" <StenoPlasma@exploitdevelopment.com> wrote:

Your MUA is defective, it strips the "References:" header! 

> Stefan,
> 
> For you information:
> 
> Cached domain accounts on a local system are not stored in the SAM.  They 
> are stored in the SECURITY registry hive.  When a cached domain user logs 
> in to the system, they do not authenticate against the SAM (As you can see 
> in my article, I am not editing the SAM).  

OUCH!
Obviously you have NOT understand a single word!

It is COMPLETELY irrelevant where cached credentials are stored on the
local computer, and I haven't written anything about that.

Logins with local user accounts are authenticated against the resp. SAM,
whereas logins with domain user accounts are authenticated against the
resp. AD. Only if the latter is not available cached credentials are used.

Stefan

[ another braindead fullquote removed]





Copyright © 1995-2018 LinuxRocket.net. All rights reserved.