Hard at Work Mid-A Off-topic Playground.

#$&% 203th Official Hard at Work Thread $%$

Thread Tools
 
Old Apr 22, 2009 | 01:14 PM
  #1601  
Vadster's Avatar
Former Moderator
 
Joined: Aug 2006
Posts: 231,381
Likes: 5,250
From: Tain-uh-see
Default

Originally Posted by tacocat,Apr 22 2009, 04:09 PM
No, its me
the link you posted is of me - tard.
Old Apr 22, 2009 | 01:14 PM
  #1602  
Nandska's Avatar
Gold Member (Premium)
20 Year Member
 
Joined: May 2004
Posts: 17,254
Likes: 75
From: VA
Default

Originally Posted by e3opian,Apr 22 2009, 05:12 PM
On the remote client, right? I can try, but not sure how that would help.
Yeah. It should reset the net shares. But I don't think that the underlying issue.
Old Apr 22, 2009 | 01:14 PM
  #1603  
Vadster's Avatar
Former Moderator
 
Joined: Aug 2006
Posts: 231,381
Likes: 5,250
From: Tain-uh-see
Default

Zeke is a tard
Old Apr 22, 2009 | 01:17 PM
  #1604  
tacocat's Avatar
15 Year Member
Photoriffic
Loved
Community Favorite
 
Joined: Aug 2006
Posts: 62,266
Likes: 2,167
From: Land O Lakes, FL
Default

Originally Posted by Vadster,Apr 22 2009, 04:14 PM
the link you posted is of me - tard.
well that is weird. Oh, well, my page is lost.
Old Apr 22, 2009 | 01:18 PM
  #1605  
Vadster's Avatar
Former Moderator
 
Joined: Aug 2006
Posts: 231,381
Likes: 5,250
From: Tain-uh-see
Default

Originally Posted by tacocat,Apr 22 2009, 04:17 PM
well that is weird. Oh, well, my page is lost.
Old Apr 22, 2009 | 01:20 PM
  #1606  
Nandska's Avatar
Gold Member (Premium)
20 Year Member
 
Joined: May 2004
Posts: 17,254
Likes: 75
From: VA
Default

Originally Posted by e3opian,Apr 22 2009, 05:12 PM
Ok, here's the thing. I need PsExec to work to remotely push Office 2007 without AD / GPO.

With PsExec, I can copy a batch script to the remote machine which executes and maps a network share and installs Office 2007 with credentials. This is tested.

But the Admin$ share isn't working on a bunch of the machines.
Ok. How about this?

This problem is caused when the "RestrictAnonymous" LSA registry value in XP gets changed from its default value of "0" (disabled) to "1" (enabled). This registry value can be located by opening regedit and going to:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Lsa]

A more user friendly way of adjusting this same setting is to go to Control Panel --> Administrative Tools --> Local Security Policy --> Local Policies --> Security Options. Make sure the following setting is set to "Disabled":
-- Network access: Do not allow anonymous enumeration of SAM accounts and shares

Do not confuse this setting with the setting that preceeds it not including the text "and shares" at the end of it. That's an entirely different setting that should be "Enabled" by default!

The following text is what Eric on the internet had to say about the issue:
Source: http://cert.uni-stuttgart.de/archive/focus...3/msg00088.html

"Null sessions can *always* be established to NT4, Windows 2000, and Windows
XP machines. If the machine's server service is enabled, and ports 139 or
445 are available, then you can do a net use with anonymous credentials,
and the system will respond with "Command completed successfully". This
has not changed from NT4 to Win2K to XP.

What has changed, however, is what you are able to do once you establish
the null session. In NT4 and Win2K, by default, you could enumerate
information about users and shares. Setting RestrictAnonymous=1 would help
prevent against this enumaration (though not fully). RestrictAnonymous=2
(Win2K only) would fully prevent this enumeration.

On Windows XP, there are new registry keys:

RestrictAnonymousSam=1 is a default setting. This prevents detailed
enumeration of user accounts. This setting correlates with the
SecurityPolicy setting "Do not allow anonymous enumeration of SAM
accounts" with a default setting 'Enabled" (meaning the default of XP will
prohibit anonymous enumeration (R.A.SAM=1).

RestrictAnonymous=0 is a default setting. This correlates with the
SecurityPolicy Setting "Do not allow anonymous enumeration of SAM accounts
and shares". Set this policy to 'Enabled' (RA=1) to prevent anonymous
enumeration of shares.

RestrictAnonymous=2 (on XP) is no longer a valid setting.

So, by default, on an XP system, you can anonymously connect and enumerate
shares by default, but you cannot enumerate detailed user information.

To disable anonymous connections altogether, block access to tcp139/445
(IPSec port filters or Internet Connection Firewall), or uncheck "File and
Print Sharing for Microsoft Networks" from the network interface in
question (via the properties tab of the network connection)."
Old Apr 22, 2009 | 01:22 PM
  #1607  
bighead's Avatar
 
Joined: Jan 2003
Posts: 21,401
Likes: 0
From: Arlington, Virginia
Default

Originally Posted by e3opian,Apr 22 2009, 05:10 PM
If I do something I shouldn't on the network, they're going to have to dig a bit more to find out who it is.
over here we use the term Life of Loan (LoL)... I lol.

we also have a group named Operations Management Group...
a excerpt from their intranet site:

[QUOTE]Monthly Speaker Series

Old Apr 22, 2009 | 01:22 PM
  #1608  
e3opian's Avatar
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jul 2005
Posts: 28,456
Likes: 228
Default

If however you do not have this set and you have just lost the ADMIN$ share which points to the %SytemRoot% folder, e.g. d:\winnt then you can recreate it by entering the following command:

C:\> net share admin$
Wonder if that would be a one-time fix. If so, I'll invest the time walking around for that.
Old Apr 22, 2009 | 01:25 PM
  #1609  
Nandska's Avatar
Gold Member (Premium)
20 Year Member
 
Joined: May 2004
Posts: 17,254
Likes: 75
From: VA
Default

It sounds like it could just be a registry edit.
Old Apr 22, 2009 | 01:25 PM
  #1610  
Nandska's Avatar
Gold Member (Premium)
20 Year Member
 
Joined: May 2004
Posts: 17,254
Likes: 75
From: VA
Default

Off to the gym



All times are GMT -8. The time now is 07:15 PM.