• 3 Posts
  • 588 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle


















  • As far as I can tell, this applies after reconnecting to the domain controller and being able to pull new credentials. It’s not 100% clear in the article, but

    Old credentials continue working for RDP—even from brand-new machines.

    Even after users change their account password, however, it remains valid for RDP logins indefinitely. In some cases, Wade reported, multiple older passwords will work while newer ones won’t. The result: persistent RDP access that bypasses cloud verification, multifactor authentication, and Conditional Access policies.

    While the password change prevents the adversary from logging in to the Microsoft or Azure account, the old password will give an adversary access to the user’s machine through RDP indefinitely.

    However

    The mechanism that makes all of this possible is credential caching on the hard drive of the local machine. The first time a user logs in using Microsoft or Azure account credentials, RDP will confirm the password’s validity online. Windows then stores the credential in a cryptographically secured format on the local machine. From then on, Windows will validate any password entered during an RDP login by comparing it against the locally stored credential, with no online lookup. With that, the revoked password will still give remote access through RDP.

    Which makes it sound like it has to be logged in successfully first, directly contradicting the first quote.

    Either way, it does appear to be an issue that an online device will accept expired passwords before it will pull new credentials from the inter/intranet