Wikiposts
Search
Computer/Internet Issues & Troubleshooting Anyone with questions about the terribly complex world of computers or the internet should try here. NOT FOR REPORTING ISSUES WITH PPRuNe FORUMS! Please use the subforum "PPRuNe Problems or Queries."

Windows limited user

Thread Tools
 
Search this Thread
 
Old 15th Apr 2010, 13:18
  #1 (permalink)  
Per Ardua ad Astraeus
Thread Starter
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Windows limited user

Whilst running as such is always a good idea, as I suspected it does not prevent malicious code from executing. At least 4 of the latest M$ 'patch tuesday' XP patches are to close vulnerabilities that would still execute even on a non-admin account. The serious hackers are, I suspect, well over that little hurdle.

Caveat emptor.
BOAC is offline  
Old 15th Apr 2010, 13:46
  #2 (permalink)  
Spoon PPRuNerist & Mad Inistrator
 
Join Date: Sep 2003
Location: Twickenham, home of rugby
Posts: 7,422
Received 283 Likes on 181 Posts
BOAC,

There's still a difference between "executing" and "installing".

My kids can run programs but sure as hell can't install any (normal user accounts).

Remember that applications that execute do so with the security privileges of the account running them.

A nasty may run while they are logged in, but can't install itself (other than to areas to which they have write access (their own profiles), so a reboot later they are not there for any other user.

I had exactly this problem as a short while ago one child had gotten one of these anti-malware nasties - problem solved by deleting their account (of course data was already backed up).

PC otherwise clean (Sophos, Spybot and Anti-malwarebytes sweeps clean).

SD
Saab Dastard is offline  
Old 15th Apr 2010, 14:30
  #3 (permalink)  
Per Ardua ad Astraeus
Thread Starter
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Yes, I know, but you cannot convince me that the 'nasties' have not worked their way around this in order to be able to plant a 'bomb' that goes off next time you run as admin.
BOAC is offline  
Old 15th Apr 2010, 16:39
  #4 (permalink)  
Spoon PPRuNerist & Mad Inistrator
 
Join Date: Sep 2003
Location: Twickenham, home of rugby
Posts: 7,422
Received 283 Likes on 181 Posts
I have read nothing yet that tells me that viruses / malware can defeat user privilege levels.

You are welcome to your opinion and "suspicions", of course.

SD
Saab Dastard is offline  
Old 15th Apr 2010, 17:00
  #5 (permalink)  
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
BOAC,

To a large extend I've got no issues with what SD says. It's simply not feasible for anything to install itself .... and viruses/trojans/spyware all rely on installation in order for them to do their deeds.

Of course, there are one or two possible exceptions ... such as a buffer overflow attack. However new features such as DEP and ASLR (given we're talking about Windows here) have made significant moves in the right direction to mitigate remaining risks.

In any event. All computer users, irrespective of operating system, should seek to do their day to day work on the principle of "least privilege" and then escalate privilieges only as and when necessary.

If you remain truly paranoid, take a look at Faronics Deep Freeze ...... one reboot and you're back to a clean state. It's been thoroughly field tested in schools, libraries and ohter "high risk" environments ...... so by all accounts it works......

Faronics Deep Freeze Windows Editions - ABSOLUTE System Integrity
mixture is offline  
Old 15th Apr 2010, 17:07
  #6 (permalink)  
Per Ardua ad Astraeus
Thread Starter
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Well, I see this as a small step 'on the way': to me it means there is a way in somewhere.

Microsoft Security Bulletin MS10-021 - Important

Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (979683)

Published: April 13, 2010
Version: 1.0
General Information

Executive Summary

This security update resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.
BOAC is offline  
Old 15th Apr 2010, 17:25
  #7 (permalink)  
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
On the face of it, that's quite a clever one.

However, it still relies on you downloading and running something you shouldn't..... "they" can't run it for you.

GPEDIT trusted paths / trusted executables if you don't want to rely on your AV program entirely....
mixture is offline  
Old 15th Apr 2010, 17:50
  #8 (permalink)  
Spoon PPRuNerist & Mad Inistrator
 
Join Date: Sep 2003
Location: Twickenham, home of rugby
Posts: 7,422
Received 283 Likes on 181 Posts
An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.
So if you allow hackers physical access to your PC you should be worried. Otherwise not.

That's quite a requirement, that logging on locally bit.

NB - given physical access to a Windows PC or server (not domain controller) even I can hack the system and change the admin password.

SD
Saab Dastard is offline  
Old 15th Apr 2010, 19:34
  #9 (permalink)  
Per Ardua ad Astraeus
Thread Starter
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
I think we will have to disagree on this. I simply do not share your complete trust in the M$ code.
BOAC is offline  
Old 15th Apr 2010, 19:59
  #10 (permalink)  
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
I simply do not share your complete trust in the M$ code.
Let's make one thing absolutley clear. I DO NOT have any trust in M$ security .... that applies for their whole product portfolio.

I'm just saying that if Microsoft Windows is your weapon of choice, then you should make use of all the security measures available, no matter how much you doubt their effectiveness.
mixture is offline  
Old 15th Apr 2010, 21:59
  #11 (permalink)  
 
Join Date: May 2001
Posts: 10,815
Likes: 0
Received 0 Likes on 0 Posts
[QUOTENB - given physical access to a Windows PC or server (not domain controller) even I can hack the system and change the admin password][/QUOTE]

it used to take us 5 mins from getting a machine through the door to raping it of all passwords of every network it had ever been logged into. We had the password for the US mil network for 6 days until someone phoned them up and told them that we had it. Domain controllers used to take 10 mins once we had physical access and I used it many times to save a network from an admin that went rabid just before they left.

And to note it was the desktop general admin password we got for the US mil, not the secure networks. Thankfully they use unix for proper security and blokes with guns stopping you getting near the servers. Once you have physical access to a server you are knackard.
mad_jock is offline  
Old 16th Apr 2010, 07:48
  #12 (permalink)  
Per Ardua ad Astraeus
Thread Starter
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Mixture - that was not aimed specifically at you, more MY opinion of the state of play of the modern hacker v those who think limited user is fireproof. Having seen the skills of these ***** in producing stuff that hides itself from most 'looks' and the rate of progress in trojan/virus writing I remain unconvinced and yes, re your last para, not just my 'weapon of choice'. but of many, and even Linux, mobiles and Mac are getting hit. I think all we can do is

limit access
protect as best we can
learn how to 'clean' when it happens

This is not specifically an anti-M$ swipe either, just that it is the logical target given the general dislike of its 'position' in the community, its wide spread and the way its code is written.
BOAC is offline  
Old 16th Apr 2010, 08:33
  #13 (permalink)  
 
Join Date: May 2001
Posts: 10,815
Likes: 0
Received 0 Likes on 0 Posts
To note if you have access to the hardware unix is just as easy to get into as microsoft
mad_jock is offline  

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.