Gaining System-Level Access To Vista 412
An anonymous reader writes "This video shows a method by which a user can use a Linux distro called BackTrack to gain system access to Windows Vista without logging into Windows or knowing the username or password for any accounts. To accomplish this, the user renames cmd.exe to Utilman.exe — this is the program that brings up the Accessibility options for users without sight or with limited vision. The attack takes advantage of the fact that the Utility Manager can be invoked before the user logs into the system. The user gains System access, which is a level higher than Administrator. The person who discovered this security hole claims that XP, 2000, 2003 and NT are not vulnerable to it; only Windows Vista is."
Oh... (Score:5, Informative)
Re:physical access == game over (Score:5, Informative)
Physical access does always mean game over, bruting(most people keep thier FDE passwords around 4 characters) and the possibility of plain text attacks exist on certain blocks.
The interesting thing is that the utility for helping impaired people is run as SYSTEM when it really doesn't have to be. I had wondered this and thought about doing the same hack before ever even seeing this video, however didn't ever bother to do it, the possibility of messing something up and having to revert it after just seemed too annoying to me.
DUH..... this works in 2000 and xp as well (Score:5, Informative)
Re:Is this how it was planned? (Score:3, Informative)
Umm (Score:3, Informative)
This is news? (Score:5, Informative)
Linux distro named BackTrack? Who is this kdawson and how is he such a fucking idiot? All the "elite haxors" in the video are doing are mounting the Windows filesystem in offline mode and doing two simple file operations. Again, how is this news and why is slashdot consistently posting more crap these days? Slashdot: morons for editors, shit that doesn't matter (anymore).
Re:Oh... (Score:4, Informative)
There isn't anything magical or hidden about a laptop hard drive.
Re:This is news? (Score:2, Informative)
Re:physical access == game over (Score:5, Informative)
Re:physical access == game over (Score:5, Informative)
The article wouldn't have been newsworthy if it had merely said "Vista just as vulnerable, nothing new." Especially since the old tricks are often the first things tried with the new OS.
Re:This isn't a real security hole. (Score:2, Informative)
Re:Physical Security (Score:4, Informative)
Re:Long weekend... (Score:4, Informative)
Re:What idiots modded this up? (Score:5, Informative)
Re:Is this how it was planned? (Score:4, Informative)
On your second point, encrypted filesystems. If the filesystem is encrypted but the user knows the password they can:
Encryption is designed to protect against people who don't know the password to the disk. The only way you can arrange this for people who logon to the machine is if physical to the machine doesn't mean physical access to the keys .. ie TPM. Even then it's uncertain as when you're logged into the machine the plaintext disk key must be available to the OS.
Likewise, if the password the user enters is poor and the 256bit key is available on the hard disk (no "keyfob") you can probably get over 100bits of plaintext for a dictionary search from just the boot sector of the harddisk.
So to avoid the attack in the FA from a third party you either need a good FDE password, so the on-disk key is used only for password changing or a keyfob that cannot be left in the machine.
Against the user of the machine it's TPM and prayer.
Re:physical access == game over (Score:1, Informative)
My hunch would be that the utility has to insert some system level hooks into Windows in order to read text from every widget (window, control, or whatever you call them) in the system. This is why it needs elevated privileges.
But the whole article is stupid. I "hacked" into my coworker's Win2000 installation almost decade ago. He was on holiday and we needed something from his PC. I downloaded nice little program from the internet, copied it to disk, booted it and changed admin password. Then we just log on to his system using the new password. Wow! Maybe I should post an article to Slashdot about this!
This does not make it blantantly obvious that you have access the victims PC.
If you reset tyhe admin password you break the system for the real owner
Re:System Access v. Admin? (Score:1, Informative)
Re:Long weekend... (Score:0, Informative)
Same technique, different vector (Score:2, Informative)
Re:This could be useful (Score:3, Informative)
Re:Apple / OS X (Score:2, Informative)
See http://support.apple.com/kb/HT1352 [apple.com]
(also covers setting the password on Open Firmware PowerPC)
Re:Long weekend... (Score:3, Informative)
Meh, not so impressive (Score:5, Informative)
What you should have done that would have been more impressive would be to boot off a Linux CD and rename the SAM file. Then when the machine was booted again the Administrator password would have been BLANK. You could then have retrieved whatever information you wanted from your "friends" computer, renamed the SAM back to it's correct name, and when he returned his password would have been the same. This would have been much nicer for your "friend" and far more impressive since you would not have had to rely on someone reversing the password storage format of the SAM file - which BTW has changed a few times. Microsoft even started using SALT, the nerve!
Anyway, the rename method would have worked out of the box without any "boring" reverse work on someone else's part and would take advantage of a stupid oversight on Microsoft's work - just like this hack does. FWIW, I LIKE Vista and know that in general it's more secure than XP. That Microsoft was so STUPID as to allow something like this to work doesn't surprise me but it does dissapoint me. Hopefully they don't fix it before I've had a chance to show a "friend" how it works
Re:physical access == game over (Score:5, Informative)
When vista says "activate now or die" tap shift 5 times, opt to go to accessibility panel, now you have an explorer window running as System, you can jump to control panel, start up all the networking and windows installer services, install those pesky Lan drivers, then exit back and activate windows.
This works so well now because of the heavy integration of explorer/iexplore and the configuration panel scripts.
Why bother? (Score:3, Informative)
Re:physical access == game over (Score:5, Informative)
Instead of using the incredibly painful phone activation, you can use this to install said LAN drivers and activate.
If you're using a pirate copy, there's no pesky activation dialog either, and if you're using a crack, you don't really need LAN drivers to use it, do you?
You don't even need a bootCD/disk (Score:3, Informative)
init=/bin/bash
It bypasses the init process (and all of the login requirements therein) to dump you straight to the *bash shell.
*Assumes bash is in the path
All part of the Macintosh heritage (Score:4, Informative)
Thus on system software changes, guess which two manufacturers' software broke the most often.
hawk