Page 2 of 2 FirstFirst 12
Results 11 to 17 of 17

Thread: how to by pass writing privileges in windows

  1. #11
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    **** me, I have to agree with Nihil here. Sounds like the whole thing is re imaged daily.

    That being said, I doubt they flash the BIOS daily.

    Resetting BIOS passwords is simple. Remove the battery power on then off usually does it. Ignore the warnings on power up. By that I mean you will be presented with options, one of which is Ignore.

    If you are not presented with these options, then you will have to determine which jumper resets the password. GOOD LUCK! if you are picking a lock to get access, as it may take a bit of research.

    Now here's the kicker. If you do get access to the BIOS and can enable CD/DVD - USB boot, it may do you no good. In most secure environments where re image is performed daily (for security purposes) Each node on the network has an IP address assigned to a MAC address.

    Any conflict within the routing table (lack of better explanation) and a SNMP alert will be sent to the admin or the physical port on the switch/server will shut down. Or both. So you have to first determine the machines ip address and mac address prior to booting up into whatever OS you choose. The boot sequence will have to include the mac and ip address when creating the virtual nic.


    Saving files on the local drive, at this point will work without setting off an alarm, but at the end of the day... No files.

    SO Whatever you write. Whatever you save. You should plan on that "whatever" to be done within a short time.
    Last edited by dinowuff; September 17th, 2010 at 11:45 PM. Reason: I forgot
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  2. #12
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    If your "whatever" is destructive and actually works, it will be traced back to the machine you altered.
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  3. #13
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Hmmmm, I can see other potential practical difficulties too.

    1. You not only have to pick the lock, you also have to relock it. This would be a problem if the lock requires a key to do it rather than just closing the hasp.

    2. I would guess the case opened alarm has be turned on? The problem here is that you need to boot the machine to change the BIOS settings, and by that time it might already have phoned home before you have a chance to reset it. You could probably get round that by disconnecting from the network temporarily, provided that your machines are turned off regularly.......otherwise that may set off an alarm?

    3. Removing the CMOS battery may not reset the BIOS password. A lot of modern motherboards store the BIOS and passwords on non-volatile EEPROM chips.

    4. There may well not be a password reset jumper switch either.

    5. If you reset the BIOS password it will be obvious what has been done.

    I agree with dinowuff in that you need to do some more research, particularly into the BIOS and motherboard features.
    Last edited by nihil; September 21st, 2010 at 09:59 AM.

  4. #14
    Gonzo District BOFH westin's Avatar
    Join Date
    Jan 2006
    Location
    SW MO
    Posts
    1,187
    Now here's the kicker. If you do get access to the BIOS and can enable CD/DVD - USB boot, it may do you no good. In most secure environments where re image is performed daily (for security purposes) Each node on the network has an IP address assigned to a MAC address.
    If you boot into a live environment, you still have the same MAC address. It reads it from the hardware. [Are you thinking of Virtual Machines?] So unless the system used static IP addressing, it shouldn't really be a problem.
    \"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"

    -HST

  5. #15
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Well, in my opinion, if you sit down in front of a public access computer and find that it has been locked down in this way, you should either get on with what you are supposed to be doing or get up and quietly walk away.

    What you are looking at is the tip of the iceberg and you have no idea what other security measures are in place. It is not a risk that is worth taking IMO.

    For example, how do you know that as part of the re-imaging routine they don't first calculate a hash total for the system drive...........they know what the answer should be.............and if somebody has added files that would be immediately obvious.

    One method I have used with computers where people have forgotten the BIOS password or inherited a box with the password set, is to disconnect the HDD and provoke the booting of a BIOS flash from removable media. That is because with SOHO and domestic machines the other boot options are generally still enabled. Flashing the BIOS usually does not ask for the password and sets it to blank.

    In the case of public access machines, they are usually set to locally boot from the C:\ drive only, and possibly the network, so this would not work.

    Of course I am sure that we have all heard of exploits that permit elevation of local privileges............ but if you want to follow that route then be prepared to go all the way to the "big house" And if the Admins are on the ball they probably won't work anyway.

    Q: "Why did you go to college son?"
    A: "To get a criminal record"

    Ummm, yeah, well..............................
    Last edited by nihil; September 18th, 2010 at 10:32 AM.

  6. #16
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    westin:

    You are correct. The mac will be the same. I was more referring to the static ip and it's relationship to the MAC. A big concern is the difference between M$ Virtual server and VMWare. As I write this I think of CITRIX and the way it controls remote hardware...

    OP - If you want to break into this system, get a job at the HelpDesk!
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  7. #17
    Gonzo District BOFH westin's Avatar
    Join Date
    Jan 2006
    Location
    SW MO
    Posts
    1,187
    dinowuff

    Ah... I see what you were saying. You were talking about a different IP coming from the same MAC all of a sudden, and tripping some alarms. Good point.
    \"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"

    -HST

Similar Threads

  1. Using Vim basics
    By gore in forum Other Tutorials Forum
    Replies: 10
    Last Post: March 28th, 2005, 08:38 AM
  2. Windows 98 Tips
    By Nokia in forum Tips and Tricks
    Replies: 5
    Last Post: June 22nd, 2004, 12:21 AM
  3. Windows XP Tips
    By Nokia in forum Tips and Tricks
    Replies: 4
    Last Post: June 18th, 2004, 04:24 PM
  4. Tcp/ip
    By gore in forum Newbie Security Questions
    Replies: 11
    Last Post: December 29th, 2003, 08:01 AM
  5. Securing Your Windows PC
    By E5C4P3 in forum The Security Tutorials Forum
    Replies: 10
    Last Post: June 12th, 2002, 04:54 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •