Fortunately, the system with the Regedit.exe enough to use.
1, read the registration form
First export the registry key you want to query, and then view it with type, for example:
c:\>regedit/e 1.reg "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal SERVER\WINSTATIONS\RDP-TCP"
C:\>type 1.reg | Find "PortNumber"
"PortNumber" =dword:00000d3d
C:\>del 1.reg
So Terminal Services port is 3389 (hexadecimal D3D)
2, modify/delete registry entries
First echo a reg file, and then import,
Windows Remote Desktop Connection is used almost every day, so the ease of use is important. If you use it frequently, you may find that in some systems, you will need to enter a password for each connection, even if you have saved the password and the password is correct.
The problem is the policy setting.
Look directly at the results, this option can be run gpedit.msc Open Group Policy Editor, set up, path for Computer Configuration > Admin templates > System > Credential Assignment > A
SIM just can ' t make it right, finally found the KB,http://h20564.www2.hp.com/hpsc/doc/public/display?docId=mmr_kc-0114705According to the knowledge base, we nearly can guess SIM using non-ntlmv2 potocols for Windows authentication, the problem Can is resolved by adding "usentlmv2=true" into the SQL connection string.Question is why the problem just pop-up? Nobody rarely touch a server like SIM, so launch rsop.msc to check policies related to NTLM.The default values from "explain",Windows $ an
to connect without authentication.
Basic: requires a user name and password in plain text (64-bit encoding) for verification.
Digest: similar to basic identity authentication, but the user name and password are hashed for transmission using a simple password.
Ntlm: Specifies NTLM authentication (only supported by IE ).
IntegratedWindowsAuthentication: Specify Windows authentication.
Negotiate: Negotiate wi
In network management, our administrator is often confused about the changes to the Telnet port. Here, we will explain the setup problems in this regard. In this article, we will introduce the specific command operations and hope to help you.
Microsoft Windows XP [version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C: \ Documents and Settings \ meizu fashion> tlntadmn
This is the command for viewing telnet settings.
The following figure shows the result.
The settings on localhost are as fo
. -P FILE uppercase, specifying the password dictionary. -e ns optional option, N: null password heuristic, s: Use specified user and password heuristics. -C FILE uses a colon-delimited format, such as "Login name: password" instead of the-l/-p parameter. The -m file specifies one line of destination list files. -o file Specifies the result output file. -F after using the-m parameter, the first login or password is found to abort the break. The number of threads running concurrently for -T TASKS
Hydra
Parameters:-RContinue to break from last progress-SUppercase with SSL link-S lowercase, you can specify a nondefault port with this parameter-L Specify cracked users, cracked for specific users-L Specify a dictionary of user names-P lowercase, specifying password cracking, less use, usually using a password dictionary-P Uppercase, specifying the password dictionary-E Optional options, N: null password heuristic, s: heuristic with specified user and password-C Use colon split format,
ssoserver, haha,
Many websites, such as Google, seem to be using this method.
In essence, JAAS only solves the problem of configurable login. For example, if Tomcat uses JAAS, it can only solve the problem of logging on to N applications on Tomcat at the same time, and it is limited to Java. The above method is required for SSO implementation. Kerberos and system 1
These modules are closely integrated, making expansion inconvenient.
3 if windows is the only logon portal, that is, there is no se
authentication.
Basic: requires a user name and password in plain text (64-bit encoding) for verification.
Digest: similar to basic identity authentication, but the user name and password are hashed for transmission using a simple password.
NTLM: Specifies NTLM authentication (only supported by IE ).
Integratedwindowsauthentication: Specify Windows authentication.
Negotiate: negotiate with the client to de
SMBSmbnt http https http-proxy Cisco-enable ldap mssql MySQL nntp vnc SOCKS5Rexec snmp cvs icq pcnfs sapr3 SSH2 SMTP-auth]Opt some service modules require specific information
I have tried my best to translate the original English description. I believe everyone can understand it.Note that the above opt can be the following values:Service Module optional parameter========================================================== ====WWW/HTTP/SSL/httpsThe verification page can be a value similar to the
its header that its authentication mode is digest authentication. Therefore, in the corresponding dialog box displayed on the client, it is required to enter username password to form a valid client credential, the credential is encrypted into the HTTP header Through the message digest secret algorithm, and then transmitted to the server together with the request. the package sent out is shown in:
Step 4:
After the server receives the request, it extracts valid client credential from the
thread security features.The security protocol used to exchange authentication information. Different validators can have the same type, but verify users based on different databases. Therefore, the type only describes how information is exchanged, rather than how information is verified. Windows Media Server and media? The player supports two built-in authentication protocols:HTTP-BASICMicrosoft Windows nt lan Manager (NTLM)HTTP-BASIC exchanges info
Security has been a problem recently, such as Windows authentication, asymmetric encryption, digital certificates, digital signatures, TLS/SSL, and WS-Security. If time permits, I would like to write a series of articles to share and exchange with the majority of users. For many readers, Windows certification is a familiar and unfamiliar topic.
Directory1. Introduction to Kerberos Authentication2. How to obtain the "subscription Certificate "?3. How can I purchase a "admission ticket" through
slightly complicated to use the applet.
The NTLM method can also be used. However, if it is firefox, a dialog box for entering the domain account username and password will pop up. However, if you enter another user's account, there will be serious security problems.
To use the account comparison method, you cannot enter an account as a user, because the password of the domain account is not verified at all.
Solution 2: jcifs Verification
To ensure
It's good to use regedit.exe in the system.
1. Read the RegistryExport the registry key you want to query and view it with type, for example:
C: \> Regedit/e 1.reg "HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ winstations \ RDP-TCP"
C: \> type 1.reg | find "portnumber""Portnumber" = DWORD: 00000d3d
C: \> Del 1.reg
Therefore, the terminal service port is 3389 (hexadecimal d3d)
2. Modify/Delete the registry key.First echo a reg file and then import it
crack for a specific user.-L FILE Specifies the user name dictionary.-P PASS Lowercase, specify password cracking, less use, usually using a password dictionary.-P FILE Uppercase, specifying the password dictionary.-e ns Optional option, N: null password heuristic, s: Use specified user and password heuristics.-C FILE uses a colon-delimited format, such as "Login: password" instead of the-l/-p parameter.-m file specifies a single line of target list files.-o file specifies the result output fil
the password dictionary-E Optional options, N: null password heuristic, s: heuristic with specified user and password-C Use colon split format, such as "Login: Password" instead of-l/-p parameter-M Specify the target list file one line at a-O Specify the result output file-FAfter using the-m parameter, find the first login or password to abort the break-T The number of concurrently running threads, default to 16-W Set the maximum time to timeout, in seconds, by default is 30s-V/-VShow detailed
]-RContinue to break from last progress-SUppercase with SSL link-S lowercase, you can specify a nondefault port with this parameter-L Specify cracked users, cracked for specific users-L Specify a dictionary of user names-P lowercase, specifying password cracking, less use, usually using a password dictionary-P Uppercase, specifying the password dictionary-E Optional options, N: null password heuristic, s: heuristic with specified user and password-C Use colon split format, such as "Login: Passwo
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.