RE: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-05-25 Thread alan.cl.wong
Hi all,

We needed to do this a new years back and it works. Hope it's
useful. I'm pasting a document that was written a while back so didn't
try with SP2. Does not know if it still works or not. Registry disable
as announce might not even be needed but just added in case.

Cheers,
-Alan

* The views express by me are not the views of my employer *

Permanent Hack:

Basic steps for WinXP SP1 and Win2K are:
 
1) Disable WFP (windows file protection)
2) rename gpupdate.exe (WinXP) secedit.exe (Win2K) 
3) registry disable GPO
 
Step 1) DISABLING WFP
 
a) Locate the sfc_os.dll file in your System32 folder
b) Copy it and rename it to sfc_os.bak
c) Edit the sfc_os.bak with any text editor (I used Ultraedit)
d) Locate offset E3BB (E3BB hex) in the file  (WinXP)
Locate offset E2B8  (E2B8 hex) in the file (Win2K)
e) at the offset, change the hex values from 8B C6 to 90 90
f) Close and save the file
 
The file sfc_os.dll exists in 2 directories: system32 and
system32dllcache (not always)

g) copy modified sfc_os.bak to sfc_os.dll
Download a tool and install onto the system "wfpadmin".
Search google...

run "wfadmin" and select c:\windows\system32 then
press the button "Deprotect". You can close wfadmin but do
not reboot. Afterwards copy your modified sfc_os.bak to
system32 and system32\dllcache as sfc_os.dll (replace existing)
 
h) Open regedit. Locate the key:
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NTCurrentVersionWinlogon
 
i) Check if the SFCDisable key exists in the right pane.
Otherwise create it (Dword) and name it: SFCDisable

j) Double click the SFCDisable key and change the value data
to:   FF9D
 
Step 2) Rename gpupdate.exe  (WinXP) or secedit.exe (Win2K) 
 
a) Locate the gpupdate.exe /secedit.exe  file (under
system32) and rename it to something else.
 
Step 3) Registry disable GPO
 
a)  enter the registry (start->run "regedit")

b) locate the registry key:
  
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System
 
c) Create a new DWORD and name it: disableGPO
d) set the new value to 1 to disable GPO. (NB: 0 is the
default value means GPO is enabled)
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of ext
Exibar
Sent: Thursday, April 27, 2006 11:19 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] bypassing Windows Domain Group Policy Objects

I seem to recall a paper on the circumventing of Windows Domain GPO's,
but I 
can't find it anywhere.

  anyone have any information on preventing GPO's from being applied to
a 
Domain machine?  or a link to that paper?

 thanks!
   Ex 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-29 Thread Richard Bjerregaard
Hejsa Exibar

27. april 2006, 16:18:42, you wrote:

E>   anyone have any information on preventing GPO's from being applied to a
E> Domain machine?  or a link to that paper?

http://www.sysinternals.com/blog/2005/04/circumventing-group-policy-settings.html

-- 
Best regards/Venlig hilsen
Richard Bjerregaard

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-28 Thread James Eaton-Lee
On Thu, 2006-04-27 at 10:37 -0400, Michael Holstein wrote:
> Other possible solution, cripple gpupdate.exe (XP) or secedit.exe (2K) 
> through permissions (eg: remove 'localsystem:execute'). Deleting them 
> will just trigger WFP to replace.

gpupdate and secedit are both just applications that interface with the
Group Policy engine to make changes to the way in which they operate;
the GPE is part of Winlogon, and uses a number of client side extensions
to make changes in the file system, registry, etc. I very much doubt if
denying access to them would prevent group policy from working.

You could attempt to do something with some of the Client Side
Extensions, such as scecli.dll, which is the dll which handles security
settings, but I can't find anyone having done anything similar online;
my guess is that the Group Policy Architecture was designed specifically
to prevent this sort of thing from being easily do-able. 

It might be worthwhile seeing if anyone who spends a lot of time
thinking about lots of this sort of thing within the context of Windows
(such as some of the guys from rootkit.com) has any ideas if you're
particularly interested.

To be honest, if you really wanted to kill group policy, the easiest
thing to do would probably be to just firewall the host in question in
order to prevent any GPOs from being downloaded from the Domain
Controller in the first place.

I may be wrong however - anyone who knows otherwise, please feel free to
enlighten me!

"How Core Group Policy Works"
http://technet2.microsoft.com/WindowsServer/en/Library/eb0042e3-699b-4c49-abcc-e3526dbecc0e1033.mspx
 has quite a good overview of how Group Policy functions.

 - James.

-- 
  James (njan) Eaton-Lee | 10807960 | http://www.jeremiad.org
  Semper Monemus Sed Non Audiunt, Ergo Lartus - (Jean-Croix)

sites: https://www.bsrf.org.uk ~ http://www.security-forums.com
   ca: https://www.cacert.org/index.php?id=3


smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-27 Thread KF (lists)

Good bit of info to pass on to the entire mailing list...
I'm sure tonight you will have few folks checking to see just how well 
he manages WSUS on your public facing machines.

-KF


The windows admin here,
however, doesn't monitor WSUS, so that fact that my machine hasn't
reported in 90 days hasn't registered.

Neil




 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-27 Thread Neil Hunt
Michael Holstein said:
> >
> > Other possible solution, cripple gpupdate.exe (XP) or 
> secedit.exe (2K) 
> > through permissions (eg: remove 'localsystem:execute'). 
> Deleting them will 
> > just trigger WFP to replace.
> >
> > /mike.
> >
Exibar said:
> 
> 
>H.  sounds like a good plan :-)   I'll test that 
> out!   thanks!
> 
>   Ex 
> 

This does indeed work, but, if the site is using WSUS or similar, then
the machine will stick out like a sore thumb.  The windows admin here,
however, doesn't monitor WSUS, so that fact that my machine hasn't
reported in 90 days hasn't registered.

Neil

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-27 Thread Exibar


- Original Message - 
From: "Michael Holstein" <[EMAIL PROTECTED]>

To: 
Sent: Thursday, April 27, 2006 10:37 AM
Subject: Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects


System Key: 
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System]

Value Name: DisableGPO
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable group policy)


strike that .. production releases ignore this.

Other possible solution, cripple gpupdate.exe (XP) or secedit.exe (2K) 
through permissions (eg: remove 'localsystem:execute'). Deleting them will 
just trigger WFP to replace.


/mike.




  H.  sounds like a good plan :-)   I'll test that out!   thanks!

 Ex 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-27 Thread Michael Holstein

System Key: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System]
Value Name: DisableGPO
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable group policy)


strike that .. production releases ignore this.

Other possible solution, cripple gpupdate.exe (XP) or secedit.exe (2K) 
through permissions (eg: remove 'localsystem:execute'). Deleting them 
will just trigger WFP to replace.


/mike.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-27 Thread Michael Holstein
 anyone have any information on preventing GPO's from being applied to a 
Domain machine?  or a link to that paper?


System Key: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System]
Value Name: DisableGPO
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable group policy)

Cheers,

Michael Holstein CISSP GCIA
Cleveland State University

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] bypassing Windows Domain Group Policy Objects

2006-04-27 Thread Exibar
I seem to recall a paper on the circumventing of Windows Domain GPO's, but I 
can't find it anywhere.


 anyone have any information on preventing GPO's from being applied to a 
Domain machine?  or a link to that paper?


thanks!
  Ex 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/