windows resume from hibernate, but not login (the screen show locked status), connect port via hub
lan port is plugged before resume: windows not send identity response
unplug and then plug lan port at pc: windows initiate start eap, switch request identity, windows not send identity response
unplug and then plug lan port at hub uplink: switch request identity, windows not send identity response
on logged on windows desktop (not auto use windows logon name in 802.1x)
unplug and then plug lan port at pc, then key user credential: windows initiate start eap, switch request identity, windows not send identity response until user enter credential
unplug and then plug hub uplink: switch request identity, windows send identity response
unplug and then plug lan port at pc (not key credential): windows initiate start eap, switch request identity, windows not send identity response
unplug and then plug hub uplink: switch request identity, windows not send identity response until user enter credential
logoff windows: windows initiate start eap, switch request identity, windows send machine identity response, success, ping success
shutdown (after logoff): no eap activity
logon windows: windows initiate start eap, switch req id x 3, (req+15s) fail, ping ok, (fail+10s) switch req id x 3, (req+15s) fail, ping ok, (fail+10s) fail, switch req id, ping fail, (req+5s) switch req id x 2, ping fail
pwdump{2,3,4}: Online password hash access tools, use Windows internal RPC functions of the Samr family (SamrQuery InformationUser( ) which support SYSKEY)
lsadump/lsadump2: Online access to the LSA Secrets database (It crash the system[1])
Applications that need to access the LSA Secrets typically use the LsaStorePrivateData( ) and LsaRetrievePrivateData( )(example) system functions to access LSA Secrets.
DPAPI_SYSTEM: Data Protection API. Data is encrypted using 3DES and a key that is not stored anywhere on the system. CryptProtectData( ), CryptUnprotectData( ), CryptProtectMemory( ). When user change passwd using standard OS tools, DPAPI will automatically open the CREDHIST file, decrypt all the master keys using the old password, and then encrypt all the master keys with the new password.
Protected Storage: HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider. Access to the Protected Storage service was provided by means of CryptoAPI functions.