- The malicious user has a roaming profile.
- The user accesses the Ntuser.dat file in their roaming profile on another computer, and then copies the hive locally.
- The user logs on as a user with administrative rights and
takes ownership of the keys that determine whether policy has been applied in
their registry hive: HKCU\Software\Microsoft\Windows\CurrentVersion\Group Policy\History
- The user sets permissions so that his or her domain account can modify these keys.
- The user then modifies the version information so that Windows Server 2003 behaves as though any new user policies have already been applied to this user.
By doing this, any new policies would not apply to the malicious user. This user can then reverse any other HKCU applied policies in a similar fashion and circumvent all user-based policy.
Note: This will not work unless the malicious user being has administrative rights on the computer from which they access the registry hive.