Remote Evil Butler Attack Threatens Windows Computers
Last November, Synopsys security researcher Ian Haken demonstrated how it would be possible to bypass Windows authentication and even BitLocker encryption on devices to which he had physical access.
The attack routine he described involved taking a computer out of the enterprise network it was assigned to and away from its original domain controller.
The attacker would set up a rogue domain controller with the same name but that used incorrect time settings, making the computer think the password's lifetime had expired. When the attacker would connect the PC to this rogue domain, they would be asked to change the computer's password, which would also be saved in a local cache file.