lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu Aug  4 03:13:52 2005
From: nathan.aguirre at gmail.com (nabiy)
Subject: hidden users on windows?

Hello,

A security issue has been identified in current versions of windows
that allows 'hidden' user accounts. The User Account Manager in the
Windows Control Panel and the 'Welcome Screen' both fail to report
interactive logons made with the netapi. This security issue has been
verified on Windows 2000 Professional, Windows XP Home Edition and
Windows XP Professional. Microsoft was notified of this issue on July
28, 2005. The problem is not with the netapi or the ability to create
users but with the User Account Manager in Windows. It simply fails to
list all of the users that are on the system.

This issue was noticed while exploring the netapi on windows ? users
created with the netuseradd function failed to show up in both the
User Account Manager and on the Welcome Screen. The failure to list
users made with the netapi presents a problem for obvious reasons;
home users and even administrators expect to see all of the users on
their system when using these facilities.
 
The solution in all versions of windows is simple. Do not depend on
the User Account Manager when managing user accounts on your system.
Instead, users should use the Local Users and Groups management snapin
or the net command from the cli.

More information has been documented at http://neworder.box.sk

nathan aguirre
--
http://nabiy.sdf1.org . gopher://sdf.lonestar.org/11/users/nabiy
The Super Dimension Fortress Public Access Unix System

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ