Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: bypassing Windows Domain Group Policy Objects
From: Michael Holstein <michael.holstein () csuohio edu>
Date: Thu, 27 Apr 2006 10:37:37 -0400

System Key: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System]
Value Name: DisableGPO
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable group policy)

strike that .. production releases ignore this.

Other possible solution, cripple gpupdate.exe (XP) or secedit.exe (2K) through permissions (eg: remove 'localsystem:execute'). Deleting them will just trigger WFP to replace.

/mike.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault