开发者

Can my Windows Domain Administrator decrypt my DPAPI encrypted files?

开发者 https://www.devze.com 2023-02-06 21:41 出处:网络
I want to encrypt passwords using the DPAPI like this ProtectedData.Protect(plain, optionalEntropy, DataProtectionScope.CurrentUser);

I want to encrypt passwords using the DPAPI like this

ProtectedData.Protect(plain, optionalEntropy, DataProtectionScope.CurrentUser);

and wonder if the domain administrator could decrypt the generated blob, as Using Passwords Effectively states:

开发者_开发百科

However, in a domain environment a domain administrator can safely change your password, and you'll still have access to your encrypted files.

It seems like the domain administrator would have to decrypt the data (or rather, the encrypted master keys) first, in order to be able to re-encrypt it using a different password.


The answer is yes, provided he also has acces to the entropy key(if one is created), or if he is willing and capable enough to hack into the blobs (see links below).

For the Master key in DPAPI (in CurrentUser mode), the windows login username and password are used to generate the master key. If the administrator updates the user's domain password, DPAPI wil reencode the master key for that user. The same goes if the user updates his password due to eg. a monthly password change policy.

However, if he doesn't have access to the optional entropy key or the data that composes that key, the file will remain encrypted and all he will get is invalid data.

If DPAPI is used in CurrentMachine mode, the file can only be decrypted on the computer that encrypted it, however the file will be readable to all accounts on that computer, again provided they can also muster the content of the entropy key.

A good repository for information is DPAPI Secrets and this paper on reverse-enginerring DPAPI + link to a tool that can recover data from DPAPI blobs


Short answer : he probably can't right out of the box, but Domain Admin is powerfull. There are many ways they can get to your key if they really want it.

Long answer : DPAPI encrypts your data with a key. IIRC, it uses AES with a key that changes every 90 days. The key is stored on your computer, encrypted with your password. That's the default and it saves your key out of reach of anyone but you.

Unless your domain admin remotely installs a key logger, steals your password, impersonnate you and steal your key (or go straight to the data which he now sees in plain text).

Another somewhat less known fact is that when Credential Roaming is enabled on Active Directory, it will send your encrypted keys to a server. A domain admin could use that copy for an offline attack. But it is hard and unless your data is very valuable, I woulnd't worry about it.


The answer is yes. PoC utility with description: Vulnerability of DPAPI data protection in Win2K, Win2K3, Windows Server 2008, and Windows Server 2012 Works in Win Server 2016/2019 as well.

0

精彩评论

暂无评论...
验证码 换一张
取 消

关注公众号