Free Republic
Browse · Search
General/Chat
Topics · Post Article

Looks pretty bad.
1 posted on 12/15/2015 1:41:21 PM PST by dayglored
[ Post Reply | Private Reply | View Replies ]


To: dayglored; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Major vulnerability in Windows Kerberos security ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to ShadowAce for the ping!!

2 posted on 12/15/2015 1:46:32 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

Kerberos, or Cerberus, is a mythical three-headed dog that guarded the underworld.
He was named by Hades.
Kerberos means “spotted”.

So yeah:
The god of the Greek underworld named his three-headed guardian dog “Spot”.


3 posted on 12/15/2015 1:51:15 PM PST by ctdonath2 (History does not long entrust the care of freedom to the week or the timid. - Ike)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

Is this just on servers or is it something all users have to worry about?


4 posted on 12/15/2015 1:51:50 PM PST by Lurkina.n.Learnin (It's a shame enobama truly doesn't care about any of this. Our country, our future, he doesn't care)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

7 posted on 12/15/2015 2:08:42 PM PST by deoetdoctrinae (Donate monthly and end FReepathons.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

Until you read the last line.


8 posted on 12/15/2015 2:32:30 PM PST by SunTzuWu
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored
It is important to be aware that only organizations that already have a fully compromised domain controller are vulnerable to this technique.

If they already own your DC you're screwed anyway.

9 posted on 12/15/2015 2:38:55 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

I just had the fun surprise of Windows 10 after about 2 months. One of the updates wiped out the installations of my CAD FEA and CNC software. GREAT!!! And it’s too late to roll it back and the only solution is to upgrade my software...To the tune of $8500. Luckily it’s only one laptop and my old one still works fine.

Back to Windows 7

This admin vulnerability sounds bad. But it sounds to me something Obama is very interested in.


11 posted on 12/15/2015 2:41:37 PM PST by Organic Panic
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored
The flaw cannot be fixed and the only solution is to introduce and use Microsoft's Credential Guard program

Must be running Windows 10 enterprise edition.
13 posted on 12/15/2015 2:53:06 PM PST by stylin19a
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

Taking a peek at the wayback archive shows that MS has known about this since 2014 at least.


14 posted on 12/15/2015 3:02:35 PM PST by Ray76
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

Microsoft crud is just to complex to comprehend. It has gotten well away from its authors. Even USB mice don’t work correctly any longer ... I suppose contact bounce isn’t being taught in Microsoft Land any longer.


15 posted on 12/15/2015 3:12:17 PM PST by GingisK
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

As I understand it Kerberos authentication is only used in enterprise environments.


17 posted on 12/15/2015 4:23:00 PM PST by Company Man (I say we take off and Trump the site from orbit. It's the only way to be sure.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

Create a bootable Linux Live USB stick and boot your Windows computer. You can see, access, change or delete any file on the hard disk with NO password required. A janitor with a Linux Live USB stick could look at every file on every Windows computer in your office.


31 posted on 12/15/2015 9:21:53 PM PST by r_barton
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

There are numerous safeguards to protect against this.

Use the “Protected Users” group in AD
Turn off Kerberos delegation for privileged users (protects against PTH as well)
Use fine-grained password policies for privileged users and require 15+ character pass phrases
Use attribute-based access control for privileged resources such as domain controllers

You can also change your krbtgt account password on a regular basis. We have ours scripted as a scheduled task that runs weekly. It’s as secure as salting your password hashes.


33 posted on 12/16/2015 10:11:47 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson