windows system accounts

User Account

Each user identity different permissions; each user has an account password; unique security identifier.

  • Local Users and Groups to view
    the computer right click -> Administration -> Local Users and Groups net user command mode

  • User information and the like check SID
    whoami / user corresponding to herein registry

User Management

  • Manage users in Server Manager

  • Open Run secpol.msc Local Security Policy Local Policies -> User Rights Assignment

Built-in user accounts

Administrator Administrator User guset guest users
and people using the computer has nothing to do: system Local System local service local authority services and users consistent low once these services are compromised, there is no access to the system in an important position of authority network service network service
computer right -> manage -> services
task Manager

Group Account

Permissions assigned one too much trouble, the user is assigned to a group inside a batch operation.

  • Add members to be man-made built-in group
    administrator guests Power Users Users (Standards Users)
  • Built-in group included members of dynamic
    members are automatically added by the program windows, dynamic changes everyone contain any user

  • Add user
有这个符号的就是加隐藏用户
net user test$ /add
  • Add User Group
    net localgroup administrators test $ / add

  • By cloning a user registry
  • By rootkit tool super hidden accounts (registry to be found)

windows password cracking

windows broken do not crack the password does not matter.

  • mimikatz Local obtain the password
    privilege::debug    /提权
    sekurlsa::logonpasswords    /抓取密码
  • PE Tools
    SAM file: Save windows password, you need to use tools to operate it.

Guess you like

Origin www.cnblogs.com/sec875/p/12236238.html