1
Projects and Discussion / Re: Windows bully project
« on: February 25, 2016, 01:50:04 pm »So, I'm going to create a scenario so that I understand what you are trying to say.
Walk up to a machine that is already on and running Windows. Plug in a USB with this tool and execute it. This tool would brute force the users password on the spot, without elevated privileges or if necessary run an exploit to acquire the necessary privileges. Is this right?
The important part of that scenario is that you do not want to turn off the machine or reboot into a linux environment. If we can reboot, then we can extract the SAM file, pillage the network, etc.
It's a cool idea, but I'm thinking about all the time it would take to create a tool like that. How does it brute force the password without elevated privileges? I still don't understand why this would be better than walking up to the running machine and executing a trojan. If I have an exploit that allows privilege escalation, I'm going to install a rootkit instead.
I would really like to see a POC. I'm curious how it would work.
Yes is precisely for that specific spot, no reboots, sneaky moment, for example when i was in a security deparment and configured hundred of machines we was sure that no one could boot from CD or anything without our permission, and also, there are more scenarios that come to my mind, anyway gona record a simple POC ASAP setting the machine up.
EDIT: Horrible busy day, sorry, only got a screencap ask for more if you need, it planed to upload at least a gif, but got shit to do. ("Invitado"=Guest User, Administradores = Administrators, 0,49s 1k tests from guest to admin. Can show how i set the password in case someone needs it to believe, anyway i was checking it, and in fact i can almost 2X that speed. Just realized i wrote POF instead of POC, as i said.. busy day, well anyway there you have it )