How can we reliably know that a user has changed his Windows account password?

Researcher 6 Reputation points
2022-05-21T06:52:09.213+00:00

We are looking at methods to identify whether a user has changed their Windows account password (Local or Domain account). Is there any foolproof way we can determine whether password has been changed?

We got to know that using Windows NT Authority command 'net user' and checking the 'password last set' value we will get this information. However we have also found that there are tools through which it is possible to modify these values and manipulate the output of the command, which makes using the password last set value as unreliable. Also can we reliably compare the windows account password hashes of old and new passwords and determine that password has been changed ? i.e. can we assume administrator cannot revert back to old password hash temporarily after logging to disguise the password change?

Windows 10 Security
Windows 10 Security
Windows 10: A Microsoft operating system that runs on personal computers and tablets.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
2,775 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. T. Kujala 8,706 Reputation points
    2022-05-21T08:03:09.13+00:00

    Hi @Researcher ,

    Domain

    You can check the Last Password Changed information for a user account in Active Directory. The information for last password changed is stored in an attribute called “PwdLastSet”. You can check the value of “PwdLastSet” using the Microsoft “ADSI Edit” tool.

    Local

    Open the command prompt window as administrator.

    Type the following command.

    net user %username%

    Also can we reliably compare the windows account password hashes of old and new passwords and determine that password has been changed ? i.e. can we assume administrator cannot revert back to old password hash temporarily after logging to disguise the password change?

    On domain members and workstations, local user account password hashes are stored in a local Security Account Manager (SAM) Database located in the registry. They are encrypted using the same encryption and hashing algorithms as Active Directory.

    So, it's not possible to compare hashes.