I think the point is microsoft is storing passwords rather than
salted, iterated hashes of passwords, storing EFS symmetric keys in
clear text or lightly obfuscated in LSA keys which is not encrypted,
just protected by policy tied to the windows login, and all these
insecure things vs say linux loopback encryption and encrypted swap,
and unix password mechanism, where your only way in is to guess salted
passwords via brute force.

With windows its just a question of booting or running tools that by
pass these "policy enforcement" windows components.

Sure most people in the security industry know windows security is not
  good, microsoft's coffee tools is just another reminder and shows
that even microsoft knows it, and can package bundles of software
making that "point and click", the same as the hacking toolkit
authors.

Adam

On Fri, May 2, 2008 at 12:32 PM, Dave Korn <[EMAIL PROTECTED]> wrote:
> Arshad Noor wrote on 30 April 2008 20:36:
>
>
>  > It can be "ordered to decrypt system passwords"???  So, I wonder
>  > what attackers can do with this...
>
>   They can run pwdump, lsadump, samdump, dump the pstore, snarf the SAM, all
>  that kind of stuff that is completely routine and everyday.
>
>   See here for a very similar device that's a couple of years old:
>  http://wiki.hak5.org/wiki/USB_Switchblade
>
>   Honestly, this is nothing extraordinary or even new.
>
>     cheers,
>       DaveK
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to