lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0A01631021B2F34D80C4D12128A20F7304A2F19F@EXCHANGE2000.oficina.euskaltel.es>
Date: Fri, 8 Sep 2006 13:12:41 +0200
From: "Angel Barrio" <abmartinez@...kaltel.es>
To: <full-disclosure@...ts.grok.org.uk>
Subject: RE: Active Directory accounts


Hi

We have recently developed a script to gather detailed user information from our AD in order to identify user accounts not used for a long time and proceed with deletion of such users. 

During our test, at least we have observed that the LastLogon property is changed not only with the interactively logon to a desktop system, but also while mapping a network drive. We have not tested it with third party applications that make use of the AD just as and LDAP for authentication, but it is very likely that this property will also be updated this way.

Regards,
--------------------------------------------------------
Angel Barrio Martínez,
 
Systems Security Engineer
 
mail: abmartinez@...kaltel.es
phone: +34 944011768
fax: 944011030
 
LinkedIn: http://www.linkedin.com/in/abmartinez
 
EUSKALTEL, S.A.
Parque tecnológico de Zamudio Edificio 809 Planta J
48160 Derio (VIZCAYA)
 
------------------------------Aviso Legal / Legal Disclaimer / Lege Oharra-----------------------------------------
 
 Este mensaje se dirige exclusivamente a su destinatario y puede contener información privilegiada o confidencial. Si no es vd. el destinatario indicado, queda notificado de que la utilización, divulgación y/o copia sin autorización está prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

This message is intended exclusively for its addressee and may contain information that is CONFIDENTIAL and protected by professional privilege. If you are not the intended recipient you are hereby notified that any dissemination, copy or disclosure of this communication is strictly prohibited by law. If this message has been received in error, please immediately notify us via e-mail and delete it.
 
 
Mezu honen hartzaile zarenez, jakinarazten dizugu posta elektronikoak eta Internet bidezko komunikazioek ez dutela ziurtatzen ez bermatzen bidalitako mezuen konfidentzialtasuna, osotasuna ez eta behar bezala jasoko direnik ere. Hori dela eta, Euskaltel S.A.k ez du bere gain hartzen egoera horien erantzukizunik. Ez baduzu baimenik eman nahi posta elektronikoa erabiltzeko edo komunikazioak Internet bidez bidaltzeko, mesedez, jakinaraz iezaguzu lehenbailehen. Mezu honen hartzailearentzat bakarrik da mezu hau. Baliteke informazio konfidentziala izatea edo sekretu profesionalari loturiko informazioa izatea, eta Legeak ez du baimentzen informazio hori zabaltzea. Mezu hau hutsegite baten ondorioz jaso baduzu, mesedez, jakinaraz iezaguzu berehala, bidaltzaileari mezu elektronikoa bidalita, eta ezabatu mezua eta horri erantsitako dokumentuak.
-----------------------------------------------------------------------------------------------------------------

-----Mensaje original-----
De: full-disclosure-bounces@...ts.grok.org.uk [mailto:full-disclosure-bounces@...ts.grok.org.uk] En nombre de Steven Rakick
Enviado el: jueves, 07 de septiembre de 2006 22:36
Para: full-disclosure@...ts.grok.org.uk
Asunto: [Full-disclosure] Active Directory accounts

Hello,

I have a question regarding some data I pulled off a
customers AD. We recently ran AD scan to identify
several user accoutn violation types using AD
Inspector (www.obtuse.net/software/adinspector).
Basically the search contained filters for users who
dont have password expirations enabled and also users
who havent logged in in the last 90 days (stale
accounts). Anyways, the results were quite suprising
and I'd like to validate them.

My question is this. Is the lastLogon AD account
property updated any time a user authenticates to AD
regardless of the service? Like, if I login to a 3rd
party application which uses LDAP integration with AD
for authentication, will that update the users
lastLogon property in AD?

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ