[12884] in bugtraq

home help back first fref pref prev next nref lref last post

Re: NT WinLogon VM contains plaintext password visible in admin

daemon@ATHENA.MIT.EDU (David LeBlanc)
Wed Dec 8 13:57:13 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Message-Id:  <3.0.3.32.19991207111223.03f92570@mail.mindspring.com>
Date:         Tue, 7 Dec 1999 11:12:23 -0800
Reply-To: David LeBlanc <dleblanc@MINDSPRING.COM>
From: David LeBlanc <dleblanc@MINDSPRING.COM>
X-To:         Robert Horvick <rhorvick@GREATPLAINS.COM>,
              BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <A7CB8F787221D2119ABB0008C724549601777B6E@exchange2.greatpl
              ains.com>

At 08:40 AM 12/7/99 -0600, Robert Horvick wrote:
>While this does require admin rights for this to work the implications of
>social engineering or an exploit to run after compromising the admin account
>are obvious.

If you can get to be admin, why not just install a keyboard sniffer, and
get everything that comes into the console?  It is still a good idea to fix
the problem, but if I can get an admin-level user to run a trojan, or
otherwise compromise a local admin account, the number of ways to hack any
subsequent user are bounded only by one's imagination.  As a friend used to
say, "the mind boggles at the possibilities" <g>.

I've got an overall problem with 'exploits' that require admin access to
run - kind of like worrying about the windows being locked when the front
door has been successfully hit with the crowbar attack.  If you can get to
be admin, you can modify the OS, and from there, you can do anything to any
user.


David LeBlanc
dleblanc@mindspring.com

home help back first fref pref prev next nref lref last post