Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: bypassing Windows Domain Group Policy Objects
From: "Exibar" <exibar () thelair com>
Date: Thu, 27 Apr 2006 10:42:20 -0400


----- Original Message ----- From: "Michael Holstein" <michael.holstein () csuohio edu>
To: <full-disclosure () lists grok org uk>
Sent: Thursday, April 27, 2006 10:37 AM
Subject: Re: [Full-disclosure] bypassing Windows Domain Group Policy Objects


System Key: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System]
Value Name: DisableGPO
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable group policy)

strike that .. production releases ignore this.

Other possible solution, cripple gpupdate.exe (XP) or secedit.exe (2K) through permissions (eg: remove 'localsystem:execute'). Deleting them will just trigger WFP to replace.

/mike.



  Hmmmm.....  sounds like a good plan :-)   I'll test that out!   thanks!

Ex
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault