Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 3314974
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 17, 20262026-05-17T22:17:45+00:00 2026-05-17T22:17:45+00:00

I have active directory and several client computers joined the active directory. In the

  • 0

I have active directory and several client computers joined the active directory.
In the client computers I have installed wcf clients.
On the server the wcf service is hosted in IIS.
I use message secyrity with windows credentials.

Everything is working fine.

But I have heard that there are some programs than can extract the password from windows (put live compact disk in the cdrom and restart the pc).

They can use the user and pass to access the wcf service from elsewhere and do damage.

Is this true and what steps can I take to be more safe ?

Regards

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-17T22:17:45+00:00Added an answer on May 17, 2026 at 10:17 pm

    Shiraz’ advice is all valid for local (not AD) Windows accounts, but I believe the threat you’re raising isn’t related to the SAM-stored local Windows passwords, since you’re talking about an Active Directory setup with Windows systems joined to the domain.

    Presumably the message security/windows credentials only allows access to the user accounts you’ve setup in Active Directory. [All discussion here assumes we’re talking about those AD accounts, not local accounts on each Windows client.]

    Assuming you’ve only allowed access to the WCF service for AD accounts, then the WCF service is only practically vulnerable to attackers who can retrieve (or guess) the plaintext password. Since you raised the spectre of live CD attacks, I’ll further assume you’re only worried about attacks on the Windows clients and not on the AD domain controller (whose physical security is presumably much stronger than the physical protections of the Windows clients).

    So the threat you’re raising is the possibility that an attacker could somehow find the user’s AD password somewhere on the hard drive of the Windows client (or an easily-broken equivalent of their password). That is not the kind of attack for which the Live CDs are generally useful – as Shiraz indicated, they’re good for digging up the password hashes out of the local SAM and helping to brute-force try many password combinations (or compare them to a local or online “rainbow table” that contains a ton of pre-calculated password values). Some of these tools also scan through local caches of such passwords, such as older browsers that saved your password for web site authentication – though modern browsers pretty much all have avoided those plaintext backdoors now.

    The main cache of a user’s AD password on a Windows client is the “cached domain credentials” (which allows you to logon with your domain password even if you’re not connected to the network). This isn’t stored as just a simple hash of your AD password – instead, it’s doubly-hashed and encrypted with the local SYSKEY, making it an order of magnitude more time-consuming to try to brute force. A reasonably long or strong (or both) AD password makes brute-force attacks pretty much infeasible except for very dedicated attackers (like espionage, governments, etc.) So your most effective tool to make sure this is infeasible is to set a reasonable password policy – complex characters and a decent minimum length is fine; non-complex but very long passwords (aka passphrases) are also worthwhile.

    Other caches of the password might exist, but that’s dependent entirely on whether your users are using really crappy applications – there are fewer and fewer such applications on the market today, but never say never.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

No related questions found

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.