Is there a way to secure Windows 8 against this login bypass? Basically an administrator can rename the utilman.exe (for example, to utilman.exe.bak) then copy cmd.exe to be utilman.exe, then at the login prompt someone can just do WinKey+U and get a fully working cmd prompt with Administrator privileges. How can this be stopped? Perhaps some way to change permissions so that utilman.exe cannot be renamed or modified etc?
- 57,463
- 369
3 Answers
BIOS and hard drive boot passwords, and encryption (or more likely a combination of them).
Check out this other SU question: BIOS Hard Drive Password Security?
It has lots of good answers explaining the differences and advantages.
Also check into full disk encryption.
Encryption is probably the only way you're going to prevent someone from fiddling with the bits if they can get their hands on the drive.
There is no way that you can keep utilman from being renamed. Even if there are permissions on it that prevent Windows from renaming it, you could rename it by booting from a Linux live CD.
You could set a password in the BIOS and then set it to ask you for that password every time you start your computer. BUT that password can most likely be reset by removing the CMOS battery.
- 1,049
- 1
- 9
- 21
-
1OK, I guess that can be perhaps combated by stopping user from modifying boot order by password protecting BIOS (assuming user won't reset it via opening up the computer). Any other way to stop this utilman security hole then? the current way I've been accessing it is via F11 recovery console allowing access to command promt on boot up, so if I can stop it being renamed from there that will probably be enough. – fpghost Jan 26 '13 at 19:12
-
-
Also i see there's more tools to reset passwords by booting from CD or USB. Install whole drive encryption then. – Kitet Jan 26 '13 at 23:42
-
You can't rename or replace utilman.exe from a linux live disk without the bitlocker password if bitlocker is enabled. – SecurityMatt Jan 30 '13 at 04:06
Just attach an invalid debugger to it so it does not execute
something like : cmd ( with admin privileges )
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\explorer.exe"
of course you don't actually need to replace the utilman.exe if you are an admin, you can just use
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe"
If someone got onto your computer and had the rights to rename utilman.exe, you have already lost the battle for security.
– Mark Allen Jan 27 '13 at 01:15net user NewUser mypass /adddidn't work, so I couldn't change users from here; it was necessary to do theutilman.exetrick to get a command shell at login time that did allow such commands to run so perhaps the trick isn't completely pointless, otherwise there would no need to actually do it at all after dropping into Admin recovery shell, as you could add yourself as a user from there anyway. – fpghost Feb 08 '13 at 09:23