{"id":109398,"date":"2024-02-13T07:00:00","date_gmt":"2024-02-13T15:00:00","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/oldnewthing\/?p=109398"},"modified":"2024-02-13T06:35:02","modified_gmt":"2024-02-13T14:35:02","slug":"20240213-00","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/oldnewthing\/20240213-00\/?p=109398","title":{"rendered":"It rather involved being on the other side of this airtight hatchway: Attacking a domain administrator from the local administrator"},"content":{"rendered":"<p>A security vulnerability report arrived that claimed to have found a way to elevate from a local administrator to domain administrator.<\/p>\n<p>Okay, this sounds interesting, because gaining local administrator privileges lets you pwn the local computer, but that doesn&#8217;t extend to other computers on the domain. Let&#8217;s see how the attack works.<\/p>\n<p>The report explains that as local administrator, you can assert SeTcbPrivilege in order to do complicated things that ultimately extract network credentials of a domain administrator who has signed into the computer.<\/p>\n<p>Okay, wait a second. You didn&#8217;t actually gain domain administrator credentials on your own. You stole them from a domain administrator who signed into the system. You had help!<\/p>\n<p>If you can assume that a domain administrator is signed in, then you don&#8217;t need to do all those complicated things to extract the domain administrator&#8217;s network credentials. You can just install a keylogger to steal the domain administrator&#8217;s network credentials. Or even simpler: Just put a program of your choosing in the system Startup group.\u00b9 That program runs with the identity of the domain administrator and can do anything the domain administrator can.<\/p>\n<p>What you really demonstrated is that if a domain administrator signs into a system, they are giving that system access to their domain account. And if they sign into a malicious system, then oops, that malicious system can do anything it wants with their domain account.<\/p>\n<p>It&#8217;s like saying, &#8220;If I give my passport to a fake police officer, then the fake police officer can steal my passport!&#8221; Well yes. So don&#8217;t give your passport to fake police officers. And don&#8217;t sign into untrusted computer systems. After all, the computer system might be running a completely fake operating system that is just pretending to be Windows!<\/p>\n<p>\u00b9 This variant was also filed as a security vulnerability report six months later.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you pwn the machine, then you pwn everyone on the machine.<\/p>\n","protected":false},"author":1069,"featured_media":111744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[26],"class_list":["post-109398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-oldnewthing","tag-other"],"acf":[],"blog_post_summary":"<p>If you pwn the machine, then you pwn everyone on the machine.<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/109398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/users\/1069"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/comments?post=109398"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/109398\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media\/111744"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media?parent=109398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/categories?post=109398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/tags?post=109398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}