$theTitle=wp_title(" - ", false); if($theTitle != "") { ?>
About Virtualization, VDI, SBC, Application Compatibility and anything else I feel like
Just a small post today: a small commandline utility that reads the “DefaultPassword” LSA secret.
This secret is stored in the registry under the SECURITY Hive:
It’s data is encrypted but can be read using the LsaRetrievePrivateData API.
It’s meaning is not documented but the value is often the Windows account password but not always 😀
EDIT: as Andrew Morgan commented the DefaultPassword key is of course the encrypted version of the Autologon password as set by for example the SysInternals Autologon tool. I really should have known that…
DefaultPassword.zip (1826 downloads)
7 Responses for "DefaultPassword Dumper"
Interesting one Remko,
the key you describe here is used by autologon (from sys internals) when you configure an autologon account.
this must correspond with the autologon options in HKLM\software\Microsoft\WindowsNT\currentversion\WinLogon
When the application is executed unprivileged it returns “OpenPolicy failed with 0xC0000022 (Access denied)”. Mayb you can force it to run privileged?
It didn’t show anything on my machine. That’s probably because I don’t use autologon from sysinternals as Andrew described.
Ingmar, it was just pure fluke I stumbled across it while I was testing on a ThinKiosk box. Another case of me and Remko working on the same thing at the same time!
I’m not sure you can force a UAC prompt on a console app either.
As @KeesBaggerman guessed this is an old project, I didn’t know at that time what the value meant but I should have known (now) that this was the Autologon Password!
I will try to add a manifest that requires admin privileges…
This is getting scary Andrew 😀
For some reason my last comment didn’t appear. You can use the tool LogonExpert to use autologon and store the password in a secure AES encrypted location.
Leave a reply