lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 23 May 2006 19:01:11 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: "Memet Anwar" <mmta.gm@...il.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: Circumventing quarantine control in Windows 2003 and ISA 2004


Dear Memet Anwar,

MA>  The problem is due to how the requirements are
MA> validated, it is trivial for users to trick RRAS/ISA into believing that the
MA> client's system are always aligned with the requirements, regardless the
MA> actual condition.

If  you  have local administrator level access to the box you can bypass
any  "internal" checks for this box. You can bypass any Domain policies.
You can do everything.

Quarantine  Control  was  not designed to protect against attack of this
kind. It's a tool to check policy matching, not to protect

http://www.microsoft.com/technet/prodtechnol/isa/2004/plan/vpnroamingquarantine.mspx

-=-=-=-=- Quote begin -=-=-=-=-

Although Quarantine Control does not protect against attackers,
computer  configurations  for  authorized  users can be verified and, if
necessary, corrected before they can access the network.

-=-=-=-=-= Quote end =-=-=-=-=-

-- 
~/ZARAZA
http://www.security.nnov.ru/



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ